Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (120)
- Association of Arab Universities (25)
- University of South Florida (14)
- University for Business and Technology in Kosovo (13)
- Universitas Negeri Yogyakarta (11)
-
- Technological University Dublin (10)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (6)
- Tashkent State Technical University (6)
- United Arab Emirates University (5)
- Embry-Riddle Aeronautical University (4)
- Faculty of Engineering, Mansoura University (4)
- Karbala International Journal of Modern Science (4)
- Southern Methodist University (4)
- Journal of Police and Legal Sciences (3)
- Kennesaw State University (3)
- Penn State Dickinson Law (3)
- University of Central Florida (3)
- Western Michigan University (3)
- Brigham Young University (2)
- DePaul University (2)
- Institute of Business Administration (2)
- Maurer School of Law: Indiana University (2)
- Purdue University (2)
- Central Bank of Nigeria (1)
- Chulalongkorn University (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Georgia Southern University (1)
- Illinois Wesleyan University (1)
- Kansas State University Libraries (1)
- Keyword
-
- Cybersecurity (13)
- Internet (12)
- ToC (10)
- Privacy (8)
- Internet of Things (6)
-
- Technology (6)
- Machine learning (5)
- Social media (5)
- TAM (5)
- Table (5)
- China (4)
- Contents (4)
- Editor (4)
- Healthcare (4)
- Information (4)
- Information security (4)
- Security (4)
- Tanzania (4)
- AI (3)
- ARIMA (3)
- Arduino (3)
- Communication (3)
- Computer and Control Systems Engineering (3)
- Covid-19 (3)
- Cyber (3)
- Data mining (3)
- Deep learning (3)
- Digital Transformation (3)
- Education (3)
- India (3)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (119)
- Applied Mathematics & Information Sciences (16)
- Military Cyber Affairs (14)
- International Journal of Business and Technology (13)
- Elinvo (Electronics, Informatics, and Vocational Education) (11)
-
- The ITB Journal (10)
- Future Computing and Informatics Journal (8)
- Chemical Technology, Control and Management (6)
- Karbala International Journal of Modern Science (4)
- Mansoura Engineering Journal (4)
- SMU Data Science Review (4)
- Bulletin of TUIT: Management and Communication Technologies (3)
- Dickinson Law Review (2017-Present) (3)
- Emirates Journal for Engineering Research (3)
- Human-Machine Communication (3)
- Journal of Communication Pedagogy (3)
- Journal of Police and Legal Sciences (3)
- Business Review (2)
- Journal of Digital Forensics, Security and Law (2)
- The Journal of Electronic Theses and Dissertations (2)
- Acta of Turin Polytechnic University in Tashkent (1)
- Australian Journal of Teacher Education (1)
- CBN Journal of Applied Statistics (JAS) (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- Communications of the IIMA (1)
- DePaul Magazine (1)
- IP Theory (1)
- In The Loop (1)
- Indiana Law Journal (1)
- Inquiry: The University of Arkansas Undergraduate Research Journal (1)
Articles 1 - 30 of 267
Full-Text Articles in Engineering
Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman
Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman
Communications of the IIMA
Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that prevent cyber threat intelligence sharing. We hypothesise that we want to maximise this cyber threat intelligence sharing to resist malicious attackers. Therefore, this research investigates factors influencing threat intelligence sharing in Nigeria's cyber security practitioners. To achieve this aim, we conducted research interviews with 14 cyber security practitioners using a semi-structured, open-ended interview guide, which was recorded and transcribed. We analysed the data using an …
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
Journal of Police and Legal Sciences
Scientists started to think about the importance of developing crowd management methods, because of human gatherings - in different countries - have been accompanied by lots of disasters that have killed many and resulted in many injuries. Gathering crowd data is vital in the process of managing crowds, as crowd information contributes significantly to planning and decision-making processes and increasing communication between parties interacting with them, and data collected includes "the number of crowd members, crowd density, and problems that may occur”. Technology and technical awareness play an important role in “collecting, organizing, analyzing” real-time collected data of crowd. This …
Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul
Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul
Future Computing and Informatics Journal
Researchers are motivated to use artificial intelligence in biometrics, medical imaging encryption, as well as cybersecurity due to its rapid progress. An encryption method for CT scans—which are used to diagnose COVID-19 disease—is proposed in this study. The suggested encryption method creates a connection among an individual's face picture and CT image to increase confidentiality. The simple CT picture is first enhanced with a host image. An encryption key is multiplied by the final result. This key is produced by applying a Convolutional Neural Network (CNN) to recognize characteristics from people's face photographs. Additionally, a straightforward CNN with three convolutional …
Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar
Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar
SMU Data Science Review
Blockchain technology has extended beyond its initial role as the infrastructure for cryptocurrencies to transform various industries with its decentralized and transparent ledger system. This paper examines the broad spectrum of blockchain applications beyond cryptocurrency. It explores its potential to innovate and drive change across finance, supply chain management, healthcare, real estate, and voting systems. We review recent literature, detail specific use cases, and discuss blockchain's challenges and opportunities, aiming to provide a comprehensive overview of its transformative impact. Integrating emerging technologies, scalability, regulatory considerations, and energy consumption are critical challenges to its adoption. Our findings underscore the need for …
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Journal of Demography
This research investigates the pervasive inequality in household internet access and use that contributes to the digital divide. As the internet becomes an integral part of daily life, variations in access and use carry significant implications for social and economic opportunities. A quantitative approach is applied, analyzing data from The National Statistical Office of Thailand to capture a comprehensive understanding of inequality in household internet access and use, as measured by the Gini coefficient. Five aspects of internet access and use are considered as the determinants of inequality, including internet connectivity, internet affordability, internet quality, device availability, and flexibility and …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Hybrid Method Neighbor Node Discovery In Wireless Sensor Networks: A Framework, Sagar Mekala, Shahu Chatrapati Kaila, Jyothi Rani Matang
Hybrid Method Neighbor Node Discovery In Wireless Sensor Networks: A Framework, Sagar Mekala, Shahu Chatrapati Kaila, Jyothi Rani Matang
Makara Journal of Technology
Wireless devices are now being adapted for diverse purposes, such as healthcare, agriculture, transportation, and tactical operations, which present challenges in network formation owing to high device mobility. Current methods rely on discovery techniques for forming wireless sensor networks (WSNs); however, the existing research has been criticized for its high time complexity and redundant neighbor discovery process. In this study, we provide a hybrid strategy to effectively handle the difficulties of locating neighboring nodes in WSNs. Our method combines several strategies to produce precise and effective neighbor detection. Herein, shared memory–based discovery, a beacon technique, and range and distance overlap …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma
Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma
The Journal of Purdue Undergraduate Research
No abstract provided.
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar
What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar
Journal of International Technology and Information Management
This paper describes the approach and lessons learned from a co-creation process with Dutch development NGOs to create a practical and easy-to-use assessment tool for practitioners to assess the organisation's maturity level of digital transformation. For this study, we applied a design science research methodology, specifically a six-step co-creation approach suitable for developing maturity models. The digital maturity assessment tool (quick scan) created is a domain- specific digital transformation maturity tool for development NGOs rather than a generally applicable tool. This artefact was evaluated using an eight-point Requirements framework for the development of digital maturity assessment tools. By developing a …
Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa
Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa
Journal of International Technology and Information Management
Developing quality agile healthcare information systems requires understanding regulatory compliance and evolving healthcare needs through activities tailored within agile scrum roles. Agile scrum, a widely adopted philosophy, offers significant advantages in managing software development processes. This research explores how activities within the agile scrum roles are tailored to agile healthcare information systems development within the Nigerian context. This study adopted a qualitative case study methodology and interviewed 12 agile practitioners developing healthcare information systems within Nigeria using semi-structured open-ended interview guide questions. The practitioners were selected based on a snowballing process, a sunset of purposive sampling techniques from our network …
Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni
Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni
Journal of International Technology and Information Management
Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …
Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian
Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Constitution, which came into force on January 26, 1950, guarantees various fundamental rights, such as the freedom of speech and expression, freedom of religion, rights to form association, as well as rights to privacy. Yet, since the adoption of the Constitution, the Indian citizen has been subject to varying degrees of media censorship and surveillance. This paper seeks to delve into the historical evolution of media and Internet censorship and surveillance in India. It shows how media censorship of varying types have existed since the British colonists introduced restrictive laws in order to expand and control the native …
Arduino-Based High-Frequency Signal Data Acquisition For Learning Media On Antenna And Wave Propagation Practices, Eko Marpanaji, Masduki Zakarijah, Nikko Aji Bayu Nugraha
Arduino-Based High-Frequency Signal Data Acquisition For Learning Media On Antenna And Wave Propagation Practices, Eko Marpanaji, Masduki Zakarijah, Nikko Aji Bayu Nugraha
Elinvo (Electronics, Informatics, and Vocational Education)
This paper discusses the research results on the development of learning media and the results of the feasibility test for the learning process. This study aims to: (1) obtain the design and prototype of Arduino-based high-frequency signal data acquisition learning media; (2) find out the level of feasibility of learning media that has been made for the learning process of Antenna Practice and Wave Propagation courses. The research model uses Research and Development with the ADDIE development method. The research stages in the ADDIE method are Analyze, Design, Develop, Implement, and Evaluate. The research began with the development of learning …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla
Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla
Emirates Journal for Engineering Research
Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security.
In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Karbala International Journal of Modern Science
The rapid development of the Internet and network services coupled with the growth of communication infrastructure necessitates the employment of intelligent systems. The complexity of the network is heightened by these systems, as they offer diverse services contingent on traffic type, user needs, and security considerations. In this context, a service function chain offers a toolkit to facilitate the management of intricate network systems. However, various traffic types require dynamic adaptation in the sets of function chains. The problem of optimizing the order of service functions in the chain must be solved using the proposed approach, along with balancing the …
A Novel Approach For Enhancing Routing In Wireless Sensor Networks Using Aco Algorithm, Sihem Goumiri, Maohamed Amine Riahla, M'Hamed Hamadouche
A Novel Approach For Enhancing Routing In Wireless Sensor Networks Using Aco Algorithm, Sihem Goumiri, Maohamed Amine Riahla, M'Hamed Hamadouche
Emirates Journal for Engineering Research
Wireless Sensors Network (WSN) is an emergent technology that aims to offer innovative capacities. In the last decade, the use of these networks increased in various fields like military, science, and health due to their fast and inexpressive deployment and installation. However, the limited sensor battery lifetime poses many technical challenges and affects essential services like routing. This issue is a hot topic of search, many researchers have proposed various routing protocols aimed at reducing the energy consumption in WSNs. The focus of this work is to investigate the effectiveness of integrating ACO algorithm with routing protocols in WSNs. Moreover, …
Forecasting Economic Growth And Movements With Wavelet Transform And Arima Model, Omar Alsinglawi, Omar Alsinglawi, Mohammad Aladwan, Mohammad Aladwan, Saddam Alwadi, Saddam Alwadi
Forecasting Economic Growth And Movements With Wavelet Transform And Arima Model, Omar Alsinglawi, Omar Alsinglawi, Mohammad Aladwan, Mohammad Aladwan, Saddam Alwadi, Saddam Alwadi
Applied Mathematics & Information Sciences
This study uses historical data and modern statistical models to forecast future Gross Domestic Product (GDP) in Jordan. The Wavelet Transformation model (WT) and Autoregressive Integrated Moving Average (ARIMA) model were applied to the time series data and yielded a best-fitting result of (2,1,1) for estimating GDP between 2022-2031. The study concludes that GDP is expected to increase with a positive growth rate of around 3.22%, and recommends government agencies to monitor GDP, strengthen existing policies, and adopt necessary economic reforms to support growth. Additionally, the private sector is encouraged to enhance production tools to achieve economic growth that benefits …
Neutrosophic Adaptive Lsb And Deep Learning Hybrid Framework For Ecg Signal Classification, Abdallah Rezk, Ahmed S. Sakr, H. M. Abdulkader
Neutrosophic Adaptive Lsb And Deep Learning Hybrid Framework For Ecg Signal Classification, Abdallah Rezk, Ahmed S. Sakr, H. M. Abdulkader
Applied Mathematics & Information Sciences
This paper proposes a novel hybrid framework for ECG signal classification and privacy preservation. The framework includes two phases: the first phase uses LSTM+CNN with attention gate for ECG classification, while the second phase utilizes adaptive least signal bit with neutrosophic for hiding important data during transmission. The proposed framework converts data into three sets of degrees (true, false, and intermediate) using neutrosophic and passes them to an embedding layer. In the sender part, the framework hides important data in ECG signal as true and false degrees, using the intermediate set as a shared dynamic key between sender and receiver. …
Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu
Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu
Applied Mathematics & Information Sciences
In our previous work, we introduced a clustering algorithm based on clique formation. Cliques, the obtained clusters, are constructed by choosing the most dense complete subgraphs by using similarity values between instances. The clique algorithm successfully reduces the number of instances in a data set without substantially changing the accuracy rate. In this current work, we focused on reducing the number of features. For this purpose, the effect of the clique clustering algorithm on dimensionality reduction has been analyzed. We propose a novel algorithm for support vector machine classification by combining these two techniques and applying different strategies by differentiating …