Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Physical Sciences and Mathematics

Enhanced Label Noise Filtering With Multiple Voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, Wajahat Ali Khan Dec 2019

Enhanced Label Noise Filtering With Multiple Voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, Wajahat Ali Khan

All Works

© 2019 by the authors. Label noises exist in many applications, and their presence can degrade learning performance. Researchers usually use filters to identify and eliminate them prior to training. The ensemble learning based filter (EnFilter) is the most widely used filter. According to the voting mechanism, EnFilter is mainly divided into two types: single-voting based (SVFilter) and multiple-voting based (MVFilter). In general, MVFilter is more often preferred because multiple-voting could address the intrinsic limitations of single-voting. However, the most important unsolved issue in MVFilter is how to determine the optimal decision point (ODP). Conceptually, the decision point is a …


Pathological Comparisons Of The Hippocampal Changes In The Transient And Permanent Middle Cerebral Artery Occlusion Rat Models, Fawad Ali Shah, Tao Li, Lina Tariq Al Kury, Alam Zeb, Shehla Khatoon, Gongping Liu, Xifei Yang, Fang Liu, Huo Yao, Arif Ullah Khan, Phil Ok Koh, Yuhua Jiang, Shupeng Li Nov 2019

Pathological Comparisons Of The Hippocampal Changes In The Transient And Permanent Middle Cerebral Artery Occlusion Rat Models, Fawad Ali Shah, Tao Li, Lina Tariq Al Kury, Alam Zeb, Shehla Khatoon, Gongping Liu, Xifei Yang, Fang Liu, Huo Yao, Arif Ullah Khan, Phil Ok Koh, Yuhua Jiang, Shupeng Li

All Works

© Copyright © 2019 Shah, Li, Kury, Zeb, Khatoon, Liu, Yang, Liu, Yao, Khan, Koh, Jiang and Li. Ischemic strokes are categorized by permanent or transient obstruction of blood flow, which impedes delivery of oxygen and essential nutrients to brain. In the last decade, the therapeutic window for tPA has increased from 3 to 5–6 h, and a new technique, involving the mechanical removal of the clot (endovascular thrombectomy) to allow reperfusion of the injured area, is being used more often. This last therapeutic approach can be done until 24 h after stroke onset. Due to this fact, more acute …


Biorthogonal-Wavelet-Based Method For Numerical Solution Of Volterra Integral Equations, Mutaz Mohammad Nov 2019

Biorthogonal-Wavelet-Based Method For Numerical Solution Of Volterra Integral Equations, Mutaz Mohammad

All Works

© 2019 by the authors. Framelets theory has been well studied in many applications in image processing, data recovery and computational analysis due to the key properties of framelets such as sparse representation and accuracy in coefficients recovery in the area of numerical and computational theory. This work is devoted to shedding some light on the benefits of using such framelets in the area of numerical computations of integral equations. We introduce a new numerical method for solving Volterra integral equations. It is based on pseudo-spline quasi-affine tight framelet systems generated via the oblique extension principles. The resulting system is …


Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a …


Follow-Up Decision Support Tool For Public Healthcare: A Design Research Perspective, Shah J. Miah, Najmul Hasan, John Gammack Oct 2019

Follow-Up Decision Support Tool For Public Healthcare: A Design Research Perspective, Shah J. Miah, Najmul Hasan, John Gammack

All Works

© 2019, Korean Society of Medical Informatics. All rights reserved. Objectives: Mobile health (m-Health) technologies may provide an appropriate follow-up support service for patient groups with post-treatment conditions. While previous studies have introduced m-Health methods for patient care, a smart system that may provide follow-up communication and decision support remains limited to the management of a few specific types of diseases. This paper introduces an m-Health solution in the current climate of increased demand for electronic information exchange. Methods: Adopting a novel design science research approach, we developed an innovative solution model for post-treatment follow-up decision support interaction for use …


Dimensions Of 'Socio' Vulnerabilities Of Advanced Persistent Threats, Mathew Nicho, Christopher D. Mcdermott Sep 2019

Dimensions Of 'Socio' Vulnerabilities Of Advanced Persistent Threats, Mathew Nicho, Christopher D. Mcdermott

All Works

© 2019 University of Split, FESB. Advanced Persistent Threats (APT) are highly targeted and sophisticated multi-stage attacks, utilizing zero day or near zero-day malware. Directed at internetworked computer users in the workplace, their growth and prevalence can be attributed to both socio (human) and technical (system weaknesses and inadequate cyber defenses) vulnerabilities. While many APT attacks incorporate a blend of socio-technical vulnerabilities, academic research and reported incidents largely depict the user as the prominent contributing factor that can weaken the layers of technical security in an organization. In this paper, our objective is to explore multiple dimensions of socio factors …


A New Approach To Information Extraction In User-Centric E-Recruitment Systems, Malik Nabeel Ahmed Awan, Sharifullah Khan, Khalid Latif, Asad Masood Khattak Jul 2019

A New Approach To Information Extraction In User-Centric E-Recruitment Systems, Malik Nabeel Ahmed Awan, Sharifullah Khan, Khalid Latif, Asad Masood Khattak

All Works

In modern society, people are heavily reliant on information available online through various channels, such as websites, social media, and web portals. Examples include searching for product prices, news, weather, and jobs. This paper focuses on an area of information extraction in e-recruitment, or job searching, which is increasingly used by a large population of users in across the world. Given the enormous volume of information related to job descriptions and users’ profiles, it is complicated to appropriately match a user’s profile with a job description, and vice versa. Existing information extraction techniques are unable to extract contextual entities. Thus, …


A Numerical Solution Of Fredholm Integral Equations Of The Second Kind Based On Tight Framelets Generated By The Oblique Extension Principle, Mutaz Mohammad Jul 2019

A Numerical Solution Of Fredholm Integral Equations Of The Second Kind Based On Tight Framelets Generated By The Oblique Extension Principle, Mutaz Mohammad

All Works

© 2019 by the authors. In this paper, we present a new computational method for solving linear Fredholm integral equations of the second kind, which is based on the use of B-spline quasi-affine tight framelet systems generated by the unitary and oblique extension principles. We convert the integral equation to a system of linear equations. We provide an example of the construction of quasi-affine tight framelet systems. We also give some numerical evidence to illustrate our method. The numerical results confirm that the method is efficient, very effective and accurate.


Role Of Outer Membrane Permeability, Efflux Mechanism, And Carbapenemases In Carbapenem-Nonsusceptible Pseudomonas Aeruginosa From Dubai Hospitals: Results Of The First Cross-Sectional Survey, Carole Ayoub Moubareck, Dalal Hammoudi Halat, Charbel Akkawi, Anju Nabi, Mouza A. Alsharhan, Zulfa O. Aldeesi, Christabel C. Peters, Handan Celiloglu, Dolla Karam Sarkis Jul 2019

Role Of Outer Membrane Permeability, Efflux Mechanism, And Carbapenemases In Carbapenem-Nonsusceptible Pseudomonas Aeruginosa From Dubai Hospitals: Results Of The First Cross-Sectional Survey, Carole Ayoub Moubareck, Dalal Hammoudi Halat, Charbel Akkawi, Anju Nabi, Mouza A. Alsharhan, Zulfa O. Aldeesi, Christabel C. Peters, Handan Celiloglu, Dolla Karam Sarkis

All Works

© 2019 The Authors Objectives: Carbapenem resistance in Pseudomonas aeruginosa is growing and results from variable mechanisms. The objectives of the current study were to investigate mechanisms of carbapenem resistance and genetic relatedness of P. aeruginosa isolates recovered in Dubai hospitals. Methods: From June 2015 through June 2016, carbapenem-nonsusceptible P. aeruginosa were collected from 4 hospitals in Dubai, and subjected to antimicrobial susceptibility testing, molecular investigation of carbapenemases by PCR-sequencing, analysis of outer membrane porin OprD2 and multidrug efflux channel MexAB-OprM levels by qPCR, and fingerprinting by ERIC-PCR. Results: Out of 1969 P. aeruginosa isolated during the study period, 471 …


Cross-Company Customer Churn Prediction In Telecommunication: A Comparison Of Data Transformation Methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar Jun 2019

Cross-Company Customer Churn Prediction In Telecommunication: A Comparison Of Data Transformation Methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar

All Works

© 2018 Elsevier Ltd Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, …


Triplet Loss Network For Unsupervised Domain Adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, Asad Masood Khattak May 2019

Triplet Loss Network For Unsupervised Domain Adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, Asad Masood Khattak

All Works

© 2019 by the authors. Domain adaptation is a sub-field of transfer learning that aims at bridging the dissimilarity gap between different domains by transferring and re-using the knowledge obtained in the source domain to the target domain. Many methods have been proposed to resolve this problem, using techniques such as generative adversarial networks (GAN), but the complexity of such methods makes it hard to use them in different problems, as fine-tuning such networks is usually a time-consuming task. In this paper, we propose a method for unsupervised domain adaptation that is both simple and effective. Our model (referred to …


A Fina Világbajnokság (2017) Önkénteseinek Szerepe Budapest Sportturizmusában, Viktória Szenyéri, Gábor Michalkó, Anestis Fotiadis Apr 2019

A Fina Világbajnokság (2017) Önkénteseinek Szerepe Budapest Sportturizmusában, Viktória Szenyéri, Gábor Michalkó, Anestis Fotiadis

All Works

Volunteers are indispensable in the organization of international mega sport events. Their activity is really important not only during these world-level meetings, but also after the competition has ended, as they play an important role in furthering the life of the events and in maintaining interest in the host location. Although the practice of volunteering in Hungary is still in its infancy, its social status and popularity are developing dynamically. The 2017 FINA Championships in Budapest is considered to be a milestone in the evolution of Hungarian volunteer work. The volunteers took part in a variety of roles in order …


The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir Apr 2019

The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the …


Wireless Sensor Networks For Big Data Systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim Apr 2019

Wireless Sensor Networks For Big Data Systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Before discovering meaningful knowledge from big data systems, it is first necessary to build a data-gathering infrastructure. Among many feasible data sources, wireless sensor networks (WSNs) are rich big data sources: a large amount of data is generated by various sensor nodes in large-scale networks. However, unlike typical wireless networks, WSNs have serious deficiencies in terms of data reliability and communication owing to the limited capabilities of the nodes. Moreover, a considerable amount of sensed data are of no interest, meaningless, and redundant when a large number of sensor nodes is …


Enhancing The Teaching And Learning Process Using Video Streaming Servers And Forecasting Techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, Kamal Uddin Sarker Apr 2019

Enhancing The Teaching And Learning Process Using Video Streaming Servers And Forecasting Techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, Kamal Uddin Sarker

All Works

© 2019 by the authors. Higher educational institutes (HEI) are adopting ubiquitous and smart equipment such as mobile devices or digital gadgets to deliver educational content in a more effective manner than the traditional approaches. In present works, a lot of smart classroom approaches have been developed, however, the student learning experience is not yet fully explored. Moreover, module historical data over time is not considered which could provide insight into the possible outcomes in the future, leading new improvements and working as an early detection method for the future results within the module. This paper proposes a framework by …


Compromised User Credentials Detection In A Digital Enterprise Using Behavioral Analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, Sajid Anwar Apr 2019

Compromised User Credentials Detection In A Digital Enterprise Using Behavioral Analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, Sajid Anwar

All Works

© 2018 In today's digital age, the digital transformation is necessary for almost every competitive enterprise in terms of having access to the best resources and ensuring customer satisfaction. However, due to such rewards, these enterprises are facing key concerns around the risk of next-generation data security or cybercrime which is continually increasing issue due to the digital transformation four essential pillars—cloud computing, big data analytics, social and mobile computing. Data transformation-driven enterprises should ready to handle this next-generation data security problem, in particular, the compromised user credential (CUC). When an intruder or cybercriminal develops trust relationships as a legitimate …


Meanings, Dimensions, And Categories Of Mathematics Teacher Beliefs: A Navigation Through The Literature, Shashidhar Belbase Mar 2019

Meanings, Dimensions, And Categories Of Mathematics Teacher Beliefs: A Navigation Through The Literature, Shashidhar Belbase

All Works

This paper aimed to discuss the meanings, dimensions, and categories of teacher beliefs about teaching and learning mathematics. I reviewed the relevant literature about teacher beliefs in general, beliefs about mathematics, and beliefs about mathematics teaching and learning in particular. Based on the review of the literature, I outlined the meanings of teacher beliefs and conceptualized three dimensions of teacher beliefs "“ affective dimension, cognitive dimension, and pedagogical dimension. Then, I discussed three viewpoints to observe teacher beliefs "“ relational, institutional, and praxis lenses. I utilized these lenses to categorize belief constructs into three classes of beliefs about mathematics, teaching …


Emerging Insights Of Health Informatics Research: A Literature Analysis For Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, John Gammack Feb 2019

Emerging Insights Of Health Informatics Research: A Literature Analysis For Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, John Gammack

All Works

This paper presents a contemporary literature review to provide insights into the current health informatics literature. The objective of this study is to identify emerging directions of current health informatics research from the latest and existing studies in the health informatics domain. We analyse existing health informatics studies using a thematic analysis, so that justified sets of research agenda can be outlined on the basis of these findings. We selected articles that are published in the science direct online database. The selected 73 sample articles (published from 2014 to 2018 in premier health informatics journals) are considered as representative samples …


A Lightweight Perceptron-Based Intrusion Detection System For Fog Computing, Belal Sudqi Khater, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim Jan 2019

A Lightweight Perceptron-Based Intrusion Detection System For Fog Computing, Belal Sudqi Khater, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim

All Works

© 2019 by the authors. Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such as latency and lack of mobility support and location-awareness. The fog is a decentralized platform capable of operating and processing data locally and can be installed in heterogeneous hardware which makes it ideal for Internet of Things (IoT) applications. Intrusion Detection Systems (IDSs) are an integral part of any security system for fog and IoT networks to ensure the quality of service. Due to the resource limitations …


Wordnet-Based Criminal Networks Mining For Cybercrime Investigation, Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington Jan 2019

Wordnet-Based Criminal Networks Mining For Cybercrime Investigation, Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington

All Works

© 2019 IEEE. Cybercriminals exploit the opportunities provided by the information revolution and social media to communicate and conduct underground illicit activities, such as online fraudulence, cyber predation, cyberbullying, hacking, blackmailing, and drug smuggling. To combat the increasing number of criminal activities, structure and content analysis of criminal communities can provide insight and facilitate cybercrime forensics. In this paper, we propose a framework to analyze chat logs for crime investigation using data mining and natural language processing techniques. The proposed framework extracts the social network from chat logs and summarizes conversation into topics. The crime investigator can use information visualizer …


Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan Jan 2019

Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan

All Works

© 2013 IEEE. Testing is a vital component of the system development life cycle. As information systems infrastructure move from native computing to cloud-based and virtualized platforms, it becomes necessary to evaluate their effectiveness to ensure completion of organizational goals. However, the complexity and scale of virtualized environments make this process difficult. Additionally, inherited and novel issues further complicate this process, while relatively high costs can be constraining. Enabling service-driven environments to provide this evaluation is therefore beneficial for both providers and users. No such complete service offering currently exists. This paper is therefore aimed to benefit industry and academia …


Effective Evaluation Of The Non-Technical Skills In The Computing Discipline, Maurice Danaher, Kevin Schoepp, Ashley Ater Kranov Jan 2019

Effective Evaluation Of The Non-Technical Skills In The Computing Discipline, Maurice Danaher, Kevin Schoepp, Ashley Ater Kranov

All Works

© 2019, Journal of Information Technology Eucation Research. Aim/Purpose Assessing non-technical skills is very difficult and current approaches typically assess the skills separately. There is a need for better quality assessment of these skills at undergraduate and postgraduate levels. Background A method has been developed for the computing discipline that assesses all six non-technical skills prescribed by ABET (Accreditation Board for Engineering and Technology), the accreditation board for engineering and technology. It has been shown to be a valid and reliable method for undergraduate students Methodology The method is based upon performance-based assessment where a team of students discuss and …


A Hybrid Framework For Sentiment Analysis Using Genetic Algorithm Based Feature Reduction, Farkhund Iqbal, Jahanzeb Maqbool Hashmi, Benjamin C.M. Fung, Rabia Batool, Asad Masood Khattak, Saiqa Aleem, Patrick C.K. Hung Jan 2019

A Hybrid Framework For Sentiment Analysis Using Genetic Algorithm Based Feature Reduction, Farkhund Iqbal, Jahanzeb Maqbool Hashmi, Benjamin C.M. Fung, Rabia Batool, Asad Masood Khattak, Saiqa Aleem, Patrick C.K. Hung

All Works

© 2019 IEEE. Due to the rapid development of Internet technologies and social media, sentiment analysis has become an important opinion mining technique. Recent research work has described the effectiveness of different sentiment classification techniques ranging from simple rule-based and lexicon-based approaches to more complex machine learning algorithms. While lexicon-based approaches have suffered from the lack of dictionaries and labeled data, machine learning approaches have fallen short in terms of accuracy. This paper proposes an integrated framework which bridges the gap between lexicon-based and machine learning approaches to achieve better accuracy and scalability. To solve the scalability issue that arises …


A Novel Quality And Reliability-Based Approach For Participants' Selection In Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, Kiyan Afsari Jan 2019

A Novel Quality And Reliability-Based Approach For Participants' Selection In Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, Kiyan Afsari

All Works

© 2013 IEEE. With the advent of mobile crowdsensing, we now have the possibility of tapping into the sensing capabilities of smartphones carried by citizens every day for the collection of information and intelligence about cities and events. Finding the best group of crowdsensing participants that can satisfy a sensing task in terms of data types required, while satisfying the quality, time, and budget constraints is a complex problem. Indeed, the time-constrained and location-based nature of crowdsensing tasks, combined with participants' mobility, render the task of participants' selection, a difficult task. In this paper, we propose a comprehensive and practical …


The Covcrav Project: Architecture And Design Of A Cooperative V2v Crash Avoidance System, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, Ansar Yasar Jan 2019

The Covcrav Project: Architecture And Design Of A Cooperative V2v Crash Avoidance System, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, Ansar Yasar

All Works

© 2019 The Authors. Published by Elsevier B.V. Systems capable of warning motorists against hazardous driving conditions are extremely useful for next-generation cooperative situational awareness and collision avoidance systems. In this paper, we present some preliminary results related to the COVCRAV project which aims to develop an on-board Road Hazard Signaling (RHS) system based on a crowd-apprising model. Unlike other approaches that rely on the automatic detection of dangerous situations via onboard sensors or warning messages received from roadside units, our approach enables drivers to interact directly with a touchscreen Driver Vehicle Interface (DVI) to notify nearby vehicles about the …


Towards An Efficient Data Fragmentation, Allocation, And Clustering Approach In A Distributed Environment, Hassan Abdalla, Abdel Monim Artoli Jan 2019

Towards An Efficient Data Fragmentation, Allocation, And Clustering Approach In A Distributed Environment, Hassan Abdalla, Abdel Monim Artoli

All Works

© 2019 by the authors. Data fragmentation and allocation has for long proven to be an efficient technique for improving the performance of distributed database systems' (DDBSs). A crucial feature of any successful DDBS design revolves around placing an intrinsic emphasis on minimizing transmission costs (TC). This work; therefore, focuses on improving distribution performance based on transmission cost minimization. To do so, data fragmentation and allocation techniques are utilized in this work along with investigating several data replication scenarios. Moreover, site clustering is leveraged with the aim of producing a minimum possible number of highly balanced clusters. By doing so, …


V2v And V2i Communications For Traffic Safety And Co2 Emission Reduction: A Performance Evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, Ansar Yasar Jan 2019

V2v And V2i Communications For Traffic Safety And Co2 Emission Reduction: A Performance Evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, Ansar Yasar

All Works

© 2019 The Authors. Published by Elsevier B.V. In this paper, we consider a special scenario where connected (V2V and V2I) vehicular technologies are used to alert motorists when they approach a hazardous zone, such as a low visibility area, and recommend proper speeds. We present the principles of the proposed safety driving system and compare the performance of V2V and V2I communications in terms of road safety effectiveness and network communication efficiency. This performance analysis is based on extensive computer simulation experiments by adapting the iTetris platform under various scenarios. We also explore, via simulations, whether CHAA systems, based …


Hicss - Modeling Privacy Preservation In Smart Connected Toys By Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, Patrick Hung Jan 2019

Hicss - Modeling Privacy Preservation In Smart Connected Toys By Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, Patrick Hung

All Works

No abstract provided.


Intensive Pre-Processing Of Kdd Cup 99 For Network Intrusion Classification Using Machine Learning Techniques, Ibrahim M. Obeidat, Nabhan Hamadneh, Mouhammd Alkasassbeh, Mohammad Almseidin, Mazen Ibrahim Alzubi Jan 2019

Intensive Pre-Processing Of Kdd Cup 99 For Network Intrusion Classification Using Machine Learning Techniques, Ibrahim M. Obeidat, Nabhan Hamadneh, Mouhammd Alkasassbeh, Mohammad Almseidin, Mazen Ibrahim Alzubi

All Works

© 2019, International Association of Online Engineering. Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity and availability of the services. The speed of the IDS is very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very …


Methodologies For Designing Healthcare Analytics Solutions: A Literature Analysis, Shah J. Miah, John Gammack, Najmul Hasan Jan 2019

Methodologies For Designing Healthcare Analytics Solutions: A Literature Analysis, Shah J. Miah, John Gammack, Najmul Hasan

All Works

© The Author(s) 2019. Healthcare analytics has been a rapidly emerging research domain in recent years. In general, healthcare solution design studies focus on developing analytic solutions that enhance product, process and practice values for clinical and non-clinical decision support. The objective of this study is to explore the scope of healthcare analytics research and in particular its utilisation of design and development methodologies. Using six prominent electronic databases, qualifying articles between 2010 and mid-2018 were sourced and categorised. A total of 52 articles on healthcare analytics solutions were selected for relevant content on public healthcare. The research team scrutinised …