60 research outputs found

    Modified SHARK Cipher and Duffing Map-Based Cryptosystem

    Get PDF
    Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK cipher. The new algorithm looks at the creation of random sequences as a problem that needs to be solved in the best way possible, and then it uses the Duffing chaotic map to get even better random sequences. Chaos has been combined with a revised edition of the SHARK structure to make the algorithm design more robust with increased confusion and diffusion. The offered algorithm includes a complex encryption and decryption structure with minimal time consumption for secure data transmission. The proposed algorithm is verified with the encryption of some standard images of different sizes. Numerous analyses have been performed to see how well the algorithm works against a variety of assaults, and the outcomes show that the cryptosystem has a good level of robustness. The comparative results are also performed in this work, which guarantees the excellent performance of our cryptosystem. The system is also subjected to chosen-plaintext and chosen-ciphertext attacks which implies that it can resist many classical cryptographic attacks. Therefore, our cryptosystem is robust enough to use for image encryption

    An interval type-2 fuzzy logic based system for improved instruction within intelligent e-learning platforms

    Get PDF
    E-learning is becoming increasingly more popular. However, for such platforms (where the students and tutors are geographically separated), it is necessary to estimate the degree of students' engagement with the course contents. Such feedback is highly important and useful for assessing the teaching quality and adjusting the teaching delivery in large-scale online learning platforms. When the number of attendees is large, it is essential to obtain overall engagement feedback, but it is also challenging to do so because of the high levels of uncertainty associated with the environments and students. To handle such uncertainties, we present a type-2 fuzzy logic based system using visual RGB-D features including head pose direction and facial expressions captured from a low-cost but robust 3D camera (Kinect v2) to estimate the engagement degree of the students for both remote and on-site education. This system enriches another self- learning type-2 fuzzy logic system which provides the instructors with suggestions to vary their teaching means to suit the level of course students and improve the course instruction and delivery. This proposed dynamic e-learning environment involves on-site students, distance students, and a teacher who delivers the lecture to all attending onsite and remote students. The rules are learned from the students' behavior and the system is continuously updated to give the teacher the ability to adapt the lecture delivery instructional approach to varied learners' engagement levels. The efficiency of the proposed system has been evaluated through various real-world experiments in the University of Essex iClassroom on a sample of thirty students and six teachers. These experiments demonstrate the efficiency of the proposed interval type-2 fuzzy logic based system to handle the faced uncertainties and produce superior improved average learners' engagements when compared to type-1 fuzzy systems and nonadaptive systems

    Employing an Enhanced Interval Approach to encode words into Linear General Type-2 fuzzy sets for Computing With Words applications

    Get PDF
    In 1996, Zadeh coined Computing With Words (CWWs) to be a methodology in which words are used instead of numbers for computing and reasoning. One of the main challenges which faced the CWWs paradigm has been modelling words adequately. Mendel has pointed out that the CWWs paradigm should employ type-2 fuzzy logic to model words. This paper proposes employing an Enhanced Interval Approach (EIA) to create Linear General Type-2 (LGT2) fuzzy sets from Interval Type-2 (IT2) fuzzy sets to encode words for CWWs applications. We have performed experiments on 18 words belonging to 3 different linguistic variables (having 6 linguistic terms each). Interval data has been collected from 17 subjects and 18 linguistic terms have been modeled with IT2 fuzzy sets using EIA. The proposed conversion approach uses several key points within the parameters of IT2 fuzzy sets to redesign the linguistic variable using LGT2 fuzzy sets. Both IT2 and LGT2 fuzzy sets have been evaluated within a CWWs Framework, which aims to mimic the ability of humans to communicate and manipulate perceptions via words. The comparison results show that LGT2 fuzzy sets can be better than IT2 fuzzy sets in mimicking human reasoning as well as learning and adaptation since the progressive Root Mean Squared Error (RMSE) and Mean Absolute Percentage Error (MAPE) values for LGT2 based CWWs Framework converge faster and are lower than those for IT2 based CWWs Framework

    Ontology-Based Linked Data to Support Decision Making within Universities

    Get PDF
    In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic research profiles of their staff. An enormous amount of scholarly data is produced continuously by online libraries that contain data about publications, citations, and research activities. This kind of data can change the accuracy of the academic decisions if linked with the local data of universities. The Linked Data technique in this study is applied to generate a link between university semantic data and an open knowledge graph to enrich the local data and improve academic decisions. As a proof of concept, a case study was conducted to allocate the best academic staff to teach a course regarding his profile, including research records. Further, the resulted data is available to reuse in the future for different purposes in academic domain. Finally, we compared the results of this link with previous work as evidence of the accuracy of leveraging this technology to improve decisions within universities

    BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things

    Get PDF
    Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospital management systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating an attribute-based encryption scheme. Furthermore, an IoT-friendly consensus algorithm is deployed to ensure fast block validation and high scalability in the IoMT network. The proposed framework can perform multiple healthcare-related services in a secure and trustworthy manner. The performance of blockchain read/write operations is evaluated in terms of transaction throughput and latency. Experimental outcomes indicate that the proposed scheme achieved an average throughput of 857 TPS and 151 TPS for read and write operations. The average latency is 61 ms and 16 ms for read and write operations, respectively

    Detection and Minimization of Malware by Implementing AI in SMEs

    Get PDF
    The malware can threaten personal privacy by opening backdoors for attackers to access user passwords, IP addresses, banking information, and other personal data, whilst some malware extracts personal data and sends them to people unknown to the users. In this chapter, the authors will present recent case studies and discuss the privacy and security threats associated with different types of malwares. The small medium enterprises (SMEs) have a unique working model forming the backbone of the UK economy and malware affects SMEs’ organizations. Also, the use of Artificial Intelligence (AI) as both an offense and defense mechanism, for the hacker, and the end user will be investigated further. In conclusion, finding a balance between IT expertise and the costs of products that are able to help SMEs protect and secure their data will benefit the SMEs by using a more intelligent controlled environment with applied machine learning techniques and not compromising on costs will be discussed

    Prediction of the Infectious Outbreak COVID-19 and Prevalence of Anxiety: Global Evidence

    No full text
    Forecasting disease outbreaks in real-time using time-series data can help for the planning of public health interventions. We used a support vector machine (SVM) model using epidemiological data provided by Johns Hopkins University Centre for Systems Science and Engineering (JHU CCSE), World Health Organization (WHO), and the Centers for Disease Control and Prevention (CDC) to predict upcoming records before the WHO made an official declaration. Our study, conducted on the time series data available from 22 January till 10 March 2020, revealed that COVID-19 was spreading at an alarming rate and progressing towards a pandemic. The initial insight that confirmed COVID-19 cases were increasing was because these received the highest number of effects for our selected dataset from 22 January to 10 March 2020, i.e., 126,344 (64%). The recovered cases were 68289 (34%), and the death rate was around 2%. Moreover, we classified the tweets from 22 January to 15 April 2020 into positive and negative sentiments to identify the emotions (stress or relaxed) posted by Twitter users related to the COVID-19 pandemic. Our analysis identified that tweets mostly conveyed a negative sentiment with a high frequency of words for #coronavirus and #lockdown amid COVID-19. However, these anxiety tweets are an alarm for healthcare authorities to devise plans accordingly

    Efficient Prediction of Court Judgments Using an LSTM+CNN Neural Network Model with an Optimal Feature Set

    No full text
    As the amount of historical data available in the legal arena has grown over time, industry specialists are driven to gather, compile, and analyze this data in order to forecast court case rulings. However, predicting and justifying court rulings while using judicial facts is no easy task. Currently, previous research on forecasting court outcomes using small experimental datasets yielded a number of unanticipated predictions utilizing machine learning (ML) models and conventional methodologies for categorical feature encoding. The current work proposes forecasting court judgments using a hybrid neural network model, namely a long short-term memory (LSTM) network with a CNN, in order to effectively forecast court rulings using historic judicial datasets. By prioritizing and choosing features that scored the highest in the provided legal data set, only the most pertinent features were picked. After that, the LSTM+CNN model was utilized to forecast lawsuit verdicts. In contrast to previous related experiments, this composite model’s testing results were promising, showing 92.05 percent accuracy, 93 percent precision, 94 percent recall, and a 93 percent F1-score

    Inferring cognitive learning styles in an e-learning environment

    Get PDF
    Dissertation (Ph.D.)--University of Kansas, Electrical Engineering & Computer Science, 2007.Computer-aided instruction has been playing a crucial role in supporting learning. Early computer-aided instruction delivered a single style of content to all learners without any consideration of their learning styles. Recently, systems have been developed to adapt content based on the learners’ learning styles. These systems use instruments, such as questionnaires and interview, to infer the learning styles. Using such instruments costs learners extra time, and they have to be done explicitly. In addition, these systems do not adapt the learning styles of learners over time. These drawbacks are the problem addressed in this study. The purpose of this research was to infer the learning styles of students while they are browsing online instruction. This indicates that the inferred process can be done implicitly, in less time, and repeated over time. The focus of this study was on the three cognitive learning styles: holist, serialist, and versatile. In order to achieve this goal, a classification system was developed, which contains three online lessons and uses two mechanisms (Tracking and Questions) to extract useful information about the users’ behaviors. The extracted features were used by a collection of classifiers to infer the users’ learning styles. These results were compared with those of the Study Preference Questionnaire by calculating the Pearson correlation between them. The major implication of this study is that the classification system developed for this study accurately infered the learning styles
    • …
    corecore