SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:2169 3536 "

Sökning: L773:2169 3536

  • Resultat 1-25 av 694
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abbas, Muhammad Tahir, et al. (författare)
  • Energy-Saving Solutions for Cellular Internet of Things - A Survey
  • 2022
  • Ingår i: IEEE Access. - IEEE : IEEE. - 2169-3536. ; 10, s. 62096-62096
  • Tidskriftsartikel (refereegranskat)abstract
    • The Cellular Internet of Things (CIoT), a new paradigm, paves the way for a large-scale deployment of IoT devices. CIoT promises enhanced coverage and massive deployment of low-cost IoT devices with an expected battery life of up to 10 years. However, such a long battery life can only be achieved provided the CIoT device is configured with energy efficiency in mind. This paper conducts a comprehensive survey on energy-saving solutions in 3GPP-based CIoT networks. In comparison to current studies, the contribution of this paper is the classification and an extensive analysis of existing energy-saving solutions for CIoT, e.g., the configuration of particular parameter values and software modifications of transport- or radio-layer protocols, while also stressing key parameters impacting the energy consumption such as the frequency of data reporting, discontinuous reception cycles (DRX), and Radio Resource Control (RRC) timers. In addition, we discuss shortcomings, limitations, and possible opportunities which can be investigated in the future to reduce the energy consumption of CIoT devices.
  •  
2.
  • Abourraja, Mohamed Nezar, et al. (författare)
  • A multi-agent based simulation model for rail–rail transshipment : An engineering approach for gantry crane scheduling
  • 2017
  • Ingår i: IEEE Access. - : IEEE Press. - 2169-3536. ; 5, s. 13142-13156
  • Tidskriftsartikel (refereegranskat)abstract
    • Le Havre Port Authority is putting into service a multimodal hub terminal with massified hinterland links (trains and barges) in order to restrict the intensive use of roads, to achieve a more attractive massification share of hinterland transportation and to provide a river connection to its maritime terminals that do not currently have one. This paper focuses on the rail-rail transshipment yard of this new terminal. In the current organizational policy, this yard is divided into two equal operating areas, and, in each one, a crane is placed, and it is equipped with reach stackers to enable container moves across both operating areas. However, this policy causes poor scheduling of crane moves, because it gives rise to many crane interference situations. For the sake of minimizing the occurrence of these undesirable situations, this paper proposes a multi-agent simulation model including an improved strategy for crane scheduling. This strategy is inspired by the ant colony approach and it is governed by a new configuration for the rail yard's working area that eliminates the use of reach stackers. The proposed simulation model is based on two planner agents, to each of which a time-horizon planning is assigned. The simulation results show that the model developed here is very successful in significantly reducing unproductive times and moves (undesirable situations), and it outperforms other existing simulation models based on the current organizational policy.
  •  
3.
  • Abuella, Mohamed, Postdoktor, 1980-, et al. (författare)
  • Spatial Clustering Approach for Vessel Path Identification
  • 2024
  • Ingår i: IEEE Access. - Piscataway, NJ : IEEE. - 2169-3536. ; 12, s. 66248-66258
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper addresses the challenge of identifying the paths for vessels with operating routes of repetitive paths, partially repetitive paths, and new paths. We propose a spatial clustering approach for labeling the vessel paths by using only position information. We develop a path clustering framework employing two methods: a distance-based path modeling and a likelihood estimation method. The former enhances the accuracy of path clustering through the integration of unsupervised machine learning techniques, while the latter focuses on likelihood-based path modeling and introduces segmentation for a more detailed analysis. The result findings highlight the superior performance and efficiency of the developed approach, as both methods for clustering vessel paths into five clusters achieve a perfect F1-score. The approach aims to offer valuable insights for route planning, ultimately contributing to improving safety and efficiency in maritime transportation. © 2013 IEEE.
  •  
4.
  • Afzal, Wasif, et al. (författare)
  • On using grey literature and google scholar in systematic literature reviews in software engineering
  • 2020
  • Ingår i: IEEE Access. - United States. - 2169-3536. ; 8, s. 36226-36243
  • Tidskriftsartikel (refereegranskat)abstract
    • © 2013 IEEE. Context: The inclusion of grey literature (GL) is important to remove publication bias while gathering available evidence regarding a certain topic. The number of systematic literature reviews (SLRs) in Software Engineering (SE) is increasing but we do not know about the extent of GL usage in these SLRs. Moreover, Google Scholar is rapidly becoming a search engine of choice for many researchers but the extent to which it can find the primary studies is not known. Objective: This tertiary study is an attempt to i) measure the usage of GL in SLRs in SE. Furthermore this study proposes strategies for categorizing GL and a quality checklist to use for GL in future SLRs; ii) explore if it is feasible to use only Google Scholar for finding scholarly articles for academic research. Method: We have conducted a systematic mapping study to measure the extent of GL usage in SE SLRs as well as to measure the feasibility of finding primary studies using Google Scholar. Results and conclusions: a) Grey Literature: 76.09% SLRs (105 out of 138) in SE have included one or more GL studies as primary studies. Among total primary studies across all SLRs (6307), 582 are classified as GL, making the frequency of GL citing as 9.23%. The intensity of GL use indicate that each SLR contains 5 primary studies on average (total intensity of GL use being 5.54). The ranking of GL tells us that conference papers are the most used form 43.3% followed by technical reports 28.52%. Universities, research institutes, labs and scientific societies together make up 67.7% of GL used, indicating that these are useful sources for searching GL. We additionally propose strategies for categorizing GL and criteria for evaluating GL quality, which can become a basis for more detailed guidelines for including GL in future SLRs. b) Google Scholar Results: The results show that Google Scholar was able to retrieve 96% of primary studies of these SLRs. Most of the primary studies that were not found using Google Scholar were from grey sources.
  •  
5.
  • Ahmad, Ijaz, et al. (författare)
  • Machine Learning Meets Communication Networks: Current Trends and Future Challenges
  • 2020
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 8, s. 223418-223460
  • Tidskriftsartikel (refereegranskat)abstract
    • The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future communicating devices and services. In this article, we provide a detailed account of current research on the application of ML in communication networks and shed light on future research challenges. Research on the application of ML in communication networks is described in: i) the three layers, i.e., physical, access, and network layers; and ii) novel computing and networking concepts such as Multi-access Edge Computing (MEC), Software Defined Networking (SDN), Network Functions Virtualization (NFV), and a brief overview of ML-based network security. Important future research challenges are identified and presented to help stir further research in key areas in this direction.
  •  
6.
  • Ahmad, Ijaz, et al. (författare)
  • Security of Satellite-Terrestrial Communications : Challenges and Potential Solutions
  • 2022
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 10, s. 96038-96052
  • Tidskriftsartikel (refereegranskat)abstract
    • The integration of satellite and terrestrial networks has become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical infrastructures in remote locations in sea, on land and in space will be seamlessly connected through a diverse set of terrestrial and non-terrestrial communication technologies. However, the integration of terrestrial and non-terrestrial systems will open up both systems to unique security challenges that can arise due to the migration of security challenges from one to another. Similarly, security challenges can also arise due to the incompatibility of distinct systems or incoherence of security policies. The resulting security implications, thus, can be highly consequential due to the criticality of the infrastructures such as space stations, autonomous ships, and airplanes, for instance. Therefore, in this article we study existing security challenges in satellite-terrestrial communication systems and discuss potential solutions for those challenges. Furthermore, we provide important research directions to encourage future research on existing security gaps.
  •  
7.
  • Ahmad, Muhammad Ovais, Senior Lecturer (författare)
  • On the Efficiency of Supernodal Factorization in Interior-Point Method Using CPU-GPU Collaboration
  • 2020
  • Ingår i: IEEE Access. - : IEEE Computer Society Digital Library. - 2169-3536. ; 8, s. 120892-120904
  • Tidskriftsartikel (refereegranskat)abstract
    • Primal-dual interior-point method (PDIPM) is the most efficient technique for solving sparse linear programming (LP) problems. Despite its efficiency, PDIPM remains a compute-intensive algorithm. Fortunately, graphics processing units (GPUs) have the potential to meet this requirement. However, their peculiar architecture entails a positive relationship between problem density and speedup, conversely implying a limited affinity of GPUs for problem sparsity. To overcome this difficulty, the state-of-the-art hybrid (CPU-GPU) implementation of PDIPM exploits presence of supernodes in sparse matrices during factorization. Supernodes are groups of similar columns that can be treated as dense submatrices. Factorization method used in the state-of-the-art solver performs only selected operations related to large supernodes on GPU. This method is known to underutilize GPU’s computational power while increasing CPU-GPU communication overhead. These shortcomings encouraged us to adapt another factorization method, which processes sets of related supernodes on GPU, and introduce it to the PDIPM implementation of a popular open-source solver. Our adaptation enabled the factorization method to better mitigate the effects of round-off errors accumulated over multiple iterations of PDIPM. To augment performance gains, we also used an efficient CPU-based matrix multiplication method. When tested for a set of well-known sparse problems, the adapted solver showed average speed-ups of approximately 55X, 1.14X and 1.05X over the open-source solver’s original version, the state-of-the-art solver, and a highly optimized proprietary solver known as CPLEX, respectively. These results strongly indicate that our proposed hybrid approach can lead to significant performance gains for solving large sparse problems.
  •  
8.
  • Ahmad, Sarosh, et al. (författare)
  • A Compact CPW-Fed Ultra-Wideband Multi-Input-Multi-Output (MIMO) Antenna for Wireless Communication Networks
  • 2022
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 10, s. 25278-25289
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, a compact coplanar waveguide (CPW) technique based ultra-wideband multiple-input-multiple-output (MIMO) antenna is proposed. The design is characterized by a broad impedance bandwidth starting from 3 GHz to 11 GHz. The overall size of the MIMO design is 60 x 60 mm(2) (1.24 x 1.24 lambda(2)(g) @ 3 GHz) with a thickness of 1.6 mm. To make the design ultra-wideband, the proposed MIMO antenna design has four jug-shaped radiating elements. The design is printed on a FR-4 substrate (relative permittivity of epsilon(r) = 4.4 and loss tangent of tan delta = 0.025). The polarization diversity phenomenon is realized by placing four antenna elements orthogonally. This arrangement increases the isolation among the MIMO antenna elements. The simulated results of the ultra-wideband MIMO antenna are verified by measured results. The proposed MIMO antenna has a measured diversity gain greater than 9.98, envelope correlation coefficient (ECC) less than 0.02, and good MIMO performance where the isolation is more than -20dB between the elements. The group delay, channel capacity loss (CCL), and the total active reflection coefficient (TARC) multiplexing efficiency and mean effective gain results are also analyzed. The group delay is found to be less than 1.2ns, CCL values calculated to be less than 0.4 bits/sec/Hz, while the TARC is below -10dB for the whole operating spectrum. The proposed design is a perfect candidate for ultra-wideband wireless communication systems and portable devices.
  •  
9.
  • Ahmad, Waqas, et al. (författare)
  • Computationally Efficient Light Field Image Compression Using a Multiview HEVC Framework
  • 2019
  • Ingår i: IEEE Access. - 2169-3536. ; 7, s. 143002-143014
  • Tidskriftsartikel (refereegranskat)abstract
    • The acquisition of the spatial and angular information of a scene using light eld (LF) technologies supplement a wide range of post-processing applications, such as scene reconstruction, refocusing, virtual view synthesis, and so forth. The additional angular information possessed by LF data increases the size of the overall data captured while offering the same spatial resolution. The main contributor to the size of captured data (i.e., angular information) contains a high correlation that is exploited by state-of-the-art video encoders by treating the LF as a pseudo video sequence (PVS). The interpretation of LF as a single PVS restricts the encoding scheme to only utilize a single-dimensional angular correlation present in the LF data. In this paper, we present an LF compression framework that efciently exploits the spatial and angular correlation using a multiview extension of high-efciency video coding (MV-HEVC). The input LF views are converted into multiple PVSs and are organized hierarchically. The rate-allocation scheme takes into account the assigned organization of frames and distributes quality/bits among them accordingly. Subsequently, the reference picture selection scheme prioritizes the reference frames based on the assigned quality. The proposed compression scheme is evaluated by following the common test conditions set by JPEG Pleno. The proposed scheme performs 0.75 dB better compared to state-of-the-art compression schemes and 2.5 dB better compared to the x265-based JPEG Pleno anchor scheme. Moreover, an optimized motionsearch scheme is proposed in the framework that reduces the computational complexity (in terms of the sum of absolute difference [SAD] computations) of motion estimation by up to 87% with a negligible loss in visual quality (approximately 0.05 dB).
  •  
10.
  • Ahmed, Bestoun S., 1982-, et al. (författare)
  • Aspects of Quality in Internet of Things (IoT) Solutions : A Systematic Mapping Study
  • 2019
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 7, s. 13758-13780
  • Tidskriftsartikel (refereegranskat)abstract
    • Internet of Things (IoT) is an emerging technology that has the promising power to change our future. Due to the market pressure, IoT systems may be released without sufficient testing. However, it is no longer acceptable to release IoT systems to the market without assuring the quality. As in the case of new technologies, the quality assurance process is a challenging task. This paper shows the results of the first comprehensive and systematic mapping study to structure and categories the research evidence in the literature starting in 2009 when the early publication of IoT papers for IoT quality assurance appeared. The conducted research is based on the most recent guidelines on how to perform systematic mapping studies. A set of research questions is defined carefully regarding the quality aspects of the IoT. Based on these questions, a large number of evidence and research papers is considered in the study (478 papers). We have extracted and analyzed different levels of information from those considered papers. Also, we have classified the topics addressed in those papers into categories based on the quality aspects. The study results carry out different areas that require more work and investigation in the context of IoT quality assurance. The results of the study can help in a further understanding of the research gaps. Moreover, the results show a roadmap for future research directions.
  •  
11.
  • Ahmed, Bestoun S., 1982-, et al. (författare)
  • Constrained interaction testing : A systematic literature study
  • 2017
  • Ingår i: IEEE Access. - Sweden : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 5, s. 25706-25730
  • Tidskriftsartikel (refereegranskat)abstract
    • Interaction testing can be used to effectively detect faults that are otherwise difficult to find by other testing techniques. However, in practice, the input configurations of software systems are subjected to constraints, especially in the case of highly configurable systems. Handling constraints effectively and efficiently in combinatorial interaction testing is a challenging problem. Nevertheless, researchers have attacked this challenge through different techniques, and much progress has been achieved in the past decade. Thus, it is useful to reflect on the current achievements and shortcomings and to identify potential areas of improvements. This paper presents the first comprehensive and systematic literature study to structure and categorize the research contributions for constrained interaction testing. Following the guidelines of conducting a literature study, the relevant data are extracted from a set of 103 research papers belonging to constrained interaction testing. The topics addressed in constrained interaction testing research are classified into four categories of constraint test generation, application, generation and application, and model validation studies. The papers within each of these categories are extensively reviewed. Apart from answering several other research questions, this paper also discusses the applications of constrained interaction testing in several domains, such as software product lines, fault detection and characterization, test selection, security, and graphical user interface testing. This paper ends with a discussion of limitations, challenges, and future work in the area.
  •  
12.
  • Ahmed, Kazi Main Uddin, 1989-, et al. (författare)
  • A Novel Reliability Index to Assess the Computational Resource Adequacy in Data Centers
  • 2021
  • Ingår i: IEEE Access. - NY : IEEE. - 2169-3536. ; 9, s. 54530-54541
  • Tidskriftsartikel (refereegranskat)abstract
    • The energy demand of data centers is increasing globally with the increasing demand for computational resources to ensure the quality of services. It is important to quantify the required resources to comply with the computational workloads at the rack-level. In this paper, a novel reliability index called loss of workload probability is presented to quantify the rack-level computational resource adequacy. The index defines the right-sizing of the rack-level computational resources that comply with the computational workloads, and the desired reliability level of the data center investor. The outage probability of the power supply units and the workload duration curve of servers are analyzed to define the loss of workload probability. The workload duration curve of the rack, hence, the power consumption of the servers is modeled as a function of server workloads. The server workloads are taken from a publicly available data set published by Google. The power consumption models of the major components of the internal power supply system are also presented which shows the power loss of the power distribution unit is the highest compared to the other components in the internal power supply system. The proposed reliability index and the power loss analysis could be used for rack-level computational resources expansion planning and ensures energy-efficient operation of the data center.
  •  
13.
  • Ahmed, Kazi Main Uddin, 1989-, et al. (författare)
  • A Review of Data Centers Energy Consumption And Reliability Modeling
  • 2021
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 9
  • Forskningsöversikt (refereegranskat)abstract
    • Enhancing the efficiency and the reliability of the data center are the technical challenges for maintaining the quality of services for the end-users in the data center operation. The energy consumption models of the data center components are pivotal for ensuring the optimal design of the internal facilities and limiting the energy consumption of the data center. The reliability modeling of the data center is also important since the end-user’s satisfaction depends on the availability of the data center services. In this review, the state-of-the-art and the research gaps of data center energy consumption and reliability modeling are identified, which could be beneficial for future research on data center design, planning, and operation. The energy consumption models of the data center components in major load sections i.e., information technology (IT), internal power conditioning system (IPCS), and cooling load section are systematically reviewed and classified, which reveals the advantages and disadvantages of the models for different applications. Based on this analysis and related findings it is concluded that the availability of the model parameters and variables are more important than the accuracy, and the energy consumption models are often necessary for data center reliability studies. Additionally, the lack of research on the IPCS consumption modeling is identified, while the IPCS power losses could cause reliability issues and should be considered with importance for designing the data center. The absence of a review on data center reliability analysis is identified that leads this paper to review the data center reliability assessment aspects, which is needed for ensuring the adaptation of new technologies and equipment in the data center. The state-of-the-art of the reliability indices, reliability models, and methodologies are systematically reviewed in this paper for the first time, where the methodologies are divided into two groups i.e., analytical and simulation-based approaches. There is a lack of research on the data center cooling section reliability analysis and the data center components’ failure data, which are identified as research gaps. In addition, the dependency of different load sections for reliability analysis of the data center is also included that shows the service reliability of the data center is impacted by the IPCS and the cooling section.
  •  
14.
  • Ait-Mlouk, Addi, et al. (författare)
  • KBot : a Knowledge graph based chatBot for natural language understanding over linked data
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 149220-149230
  • Tidskriftsartikel (refereegranskat)abstract
    • With the rapid progress of the semantic web, a huge amount of structured data has become available on the web in the form of knowledge bases (KBs). Making these data accessible and useful for end-users is one of the main objectives of chatbots over linked data. Building a chatbot over linked data raises different challenges, including user queries understanding, multiple knowledge base support, and multilingual aspect. To address these challenges, we first design and develop an architecture to provide an interactive user interface. Secondly, we propose a machine learning approach based on intent classification and natural language understanding to understand user intents and generate SPARQL queries. We especially process a new social network dataset (i.e., myPersonality) and add it to the existing knowledge bases to extend the chatbot capabilities by understanding analytical queries. The system can be extended with a new domain on-demand, flexible, multiple knowledge base, multilingual, and allows intuitive creation and execution of different tasks for an extensive range of topics. Furthermore, evaluation and application cases in the chatbot are provided to show how it facilitates interactive semantic data towards different real application scenarios and showcase the proposed approach for a knowledge graph and data-driven chatbot.
  •  
15.
  • Akbarian, Fatemeh, et al. (författare)
  • Attack Resilient Cloud-Based Control Systems for Industry 4.0
  • 2023
  • Ingår i: IEEE Access. - 2169-3536. ; 11, s. 27865-27882
  • Tidskriftsartikel (refereegranskat)abstract
    • In recent years, since the cloud can provide tremendous advantages regarding storage and computing resources, the industry has been motivated to move industrial control systems to the cloud. However, the cloud also introduces significant security challenges since moving control systems to the cloud can enable attackers to infiltrate the system and establish an attack that can lead to damages and disruptions with potentially catastrophic consequences. Therefore, some security measures are necessary to detect these attacks in a timely manner and mitigate their impact. In this paper, we propose a security framework for cloud control systems that makes them resilient against attacks. This framework includes three steps: attack detection, attack isolation, and attack mitigation. We validate our proposed framework on a real testbed and evaluate its capability by subjecting it to a set of attacks. We show that our proposed solution can detect an attack in a timely manner and keep the plant stable, with high performance during the attack.
  •  
16.
  • Akil, Mahdi, et al. (författare)
  • Privacy-Preserving Identifiers for IoT : A Systematic Literature Review
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 168470-168485
  • Forskningsöversikt (refereegranskat)abstract
    • The Internet of Things (IoT) paves the way for smart applications such as in E-health, E-homes, transportation, or energy production. However, IoT technologies also pose privacy challenges for their users, as they allow the tracking and monitoring of the users' behavior and context. The EU General Data Protection Regulation (GDPR) mandates data controller to follow a data protection by design and default approach by implementing for instance pseudonymity for achieving data minimisation. This paper provides a systematic literature review for answering the question of what types of privacy-preserving identifiers are proposed by the literature in IoT environments for implementing pseudonymity. It contributes with classifications and analyses of IoT environments for which privacy-preserving identifiers have been proposed and of the pseudonym types and underlying identity management architectures used. Moreover, it discusses trends and gaps in regard to addressing privacy trade-offs.
  •  
17.
  • Akram, Shazad, et al. (författare)
  • Design and Development of a Battery Powered Electrofusion Welding System for Optical Fiber Microducts
  • 2020
  • Ingår i: IEEE Access. - 2169-3536. ; 8, s. 173024-173043
  • Tidskriftsartikel (refereegranskat)abstract
    • At present, optical fiber microducts are coupled together by mechanical types of joints. Mechanical joints are thick, require a large space, and reduce the installation distance in multi-microduct installation. They may leak or explode in the blown fiber installation process. Mechanical joints are subjected to time dependent deterioration under long service times beneath the earth's surface. It may start with a small leakage, followed by damage due to water freezing inside the optical fiber microduct. Optical fiber microducts are made up of high-density polyethylene, which is considered most suitable for thermoelectric welding. For thermoelectric welding of two optical fiber microducts, the welding time should be one second, and should not cause any damage to the inner structure of the microducts that are being coupled. To fulfill these requirements, an LTspice simulation model for the welding system was developed and validated. The developed LTspice model has two parts. The first part models the power input to joule heating wire and the second part models the heat propagation inside the different layers of the optical fiber microduct and surrounding joint by using electro-thermal analogy. In order to validate the simulation results, a battery powered prototype welding system was developed and tested. The prototype welding system consists of a custom-built electrofusion joint and a controller board. A 40 volt 4 ampere-hour Li-Ion battery was used to power the complete system. The power drawn from the battery was controlled by charging and discharging of a capacitor bank, which makes sure that the battery is not overloaded. After successful welding, a pull strength test and an air pressure leakage test were performed to ensure that the welded joints met the requirements set by the mechanical joints. The results show that this new kind of joint and welding system can effectively replace mechanical joints in future optical fiber duct installations.
  •  
18.
  • Al Banna, Md. Hasan, et al. (författare)
  • Attention-based Bi-directional Long-Short Term Memory Network for Earthquake Prediction
  • 2021
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 9, s. 56589-56603
  • Tidskriftsartikel (refereegranskat)abstract
    • An earthquake is a tremor felt on the surface of the earth created by the movement of the major pieces of its outer shell. Till now, many attempts have been made to forecast earthquakes, which saw some success, but these attempted models are specific to a region. In this paper, an earthquake occurrence and location prediction model is proposed. After reviewing the literature, long short-term memory (LSTM) is found to be a good option for building the model because of its memory-keeping ability. Using the Keras tuner, the best model was selected from candidate models, which are composed of combinations of various LSTM architectures and dense layers. This selected model used seismic indicators from the earthquake catalog of Bangladesh as features to predict earthquakes of the following month. Attention mechanism was added to the LSTM architecture to improve the model’s earthquake occurrence prediction accuracy, which was 74.67%. Additionally, a regression model was built using LSTM and dense layers to predict the earthquake epicenter as a distance from a predefined location, which provided a root mean square error of 1.25.
  •  
19.
  • Al-Dhaqm, Arafat, et al. (författare)
  • A Review of Mobile Forensic Investigation Process Models
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 173359-173375
  • Forskningsöversikt (refereegranskat)abstract
    • Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the need for new requirements have led to the development of the MF field, which has in the recent past become an area of importance. In this article, the authors take a step to conduct a review on Mobile Forensics Investigation Process Models (MFIPMs) as a step towards uncovering the MF transitions as well as identifying open and future challenges. Based on the study conducted in this article, a review of the literature revealed that there are a few MFIPMs that are designed for solving certain mobile scenarios, with a variety of concepts, investigation processes, activities, and tasks. A total of 100 MFIPMs were reviewed, to present an inclusive and up-to-date background of MFIPMs. Also, this study proposes a Harmonized Mobile Forensic Investigation Process Model (HMFIPM) for the MF field to unify and structure whole redundant investigation processes of the MF field. The paper also goes the extra mile to discuss the state of the art of mobile forensic tools, open and future challenges from a generic standpoint. The results of this study find direct relevance to forensic practitioners and researchers who could leverage the comprehensiveness of the developed processes for investigation.
  •  
20.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Categorization and Organization of Database Forensic Investigation Processes
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 112846-112858
  • Tidskriftsartikel (refereegranskat)abstract
    • Database forensic investigation (DBFI) is an important area of research within digital forensics. It & x2019;s importance is growing as digital data becomes more extensive and commonplace. The challenges associated with DBFI are numerous, and one of the challenges is the lack of a harmonized DBFI process for investigators to follow. In this paper, therefore, we conduct a survey of existing literature with the hope of understanding the body of work already accomplished. Furthermore, we build on the existing literature to present a harmonized DBFI process using design science research methodology. This harmonized DBFI process has been developed based on three key categories (i.e. planning, preparation and pre-response, acquisition and preservation, and analysis and reconstruction). Furthermore, the DBFI has been designed to avoid confusion or ambiguity, as well as providing practitioners with a systematic method of performing DBFI with a higher degree of certainty.
  •  
21.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Digital Forensics Subdomains : The State of the Art and Future Directions
  • 2021
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 9, s. 152476-152502
  • Tidskriftsartikel (refereegranskat)abstract
    • For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques focus on computer desktops and servers. However, recent advances in digital media and platforms have seen an increased need for the application of digital forensic investigation techniques to other subdomains. This includes mobile devices, databases, networks, cloud-based platforms, and the Internet of Things (IoT) at large. To assist forensic investigators to conduct investigations within these subdomains, academic researchers have attempted to develop several investigative processes. However, many of these processes are domain-specific or describe domain-specific investigative tools. Hence, in this paper, we hypothesize that the literature is saturated with ambiguities. To further synthesize this hypothesis, a digital forensic model-orientated Systematic Literature Review (SLR) within the digital forensic subdomains has been undertaken. The purpose of this SLR is to identify the different and heterogeneous practices that have emerged within the specific digital forensics subdomains. A key finding from this review is that there are process redundancies and a high degree of ambiguity among investigative processes in the various subdomains. As a way forward, this study proposes a high-level abstract metamodel, which combines the common investigation processes, activities, techniques, and tasks for digital forensics subdomains. Using the proposed solution, an investigator can effectively organize the knowledge process for digital investigation.
  •  
22.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 145018-145032
  • Tidskriftsartikel (refereegranskat)abstract
    • For every contact that is made in a database, a digital trace will potentially be left and most of the database breaches are mostly aimed at defeating the major security goals (Confidentiality, Integrity, and Authenticity) of data that reside in the database. In order to prove/refute a fact during litigation, it is important to identify suitable investigation techniques that can be used to link a potential incident/suspect to the digital crime. As a result, this paper has proposed suitable steps of constructing and Integrated Incident Response Model (IIRM) that can be relied upon in the database forensic investigation field. While developing the IIRM, design science methodology has been adapted and the outcome of this study has shown significant and promising approaches that could be leveraged by digital forensic experts, legal practitioners and law enforcement agencies. This is owing to the fact, that IIRM construction has followed incident investigation principles that are stipulated in ISO guidelines.
  •  
23.
  • Alam, Sana, et al. (författare)
  • Trust Management in Social Internet of Things (SIoT) : A Survey
  • 2022
  • Ingår i: IEEE Access. - 2169-3536. ; 10, s. 108924-108954
  • Tidskriftsartikel (refereegranskat)abstract
    • A survey on trust management in the Social Internet of Things (SIoT) is provided, beginning with a discussion of SIoT architectures and relationships. Using a variety of publication databases, we describe efforts that focus on various trust management aspects of SIoT. Trust management models comprise three themes: trust computation, aggregation, and updates. Our study presents a detailed discussion of all three steps. Trust computation and trust aggregation depend upon Trust Attributes (TAs) for the calculation of local and global trust values. Our paper discusses many strategies for aggregating trust, but “Weighted Sum” is the most frequently used in the relevant studies. Our paper addresses trust computation and aggregation scenarios. Our work classifies research by TAs (Social Trust, Quality of Service). We’ve categorized the research (reputation-based, recommendation-based, knowledge-based) depending on the types of feedback/opinions used to calculate trust values (global feedback/opinion, feedback from a friend, trustor’s own opinion considering the trustee’s information). Our work classifies studies (policy-based, prediction-based, weighted sum-based/weighted linear combination-based) by trust computation/aggregation approach. Two trust-update schemes are discussed: time-driven and event-driven schemes, while most trust management models utilize an event-driven scheme. Both trust computation and aggregation need propagating trust values in a centralized, decentralized, or semi-centralized way. Our study covers classifying research by trust updates and propagation techniques. Trust models should provide resiliency to SIoT attacks. This analysis classifies SIoT attacks as collaborative or individual. We also discuss scenarios depicted in the relevant studies to incorporate resistance against trust-related attacks in SIoT. Studies suggest context-based or context-free trust management strategies. Our study categorizes studies based on context-based or context-free approaches. To gain the benefits of an immutable, privacy-preserving approach, a future trust management system should utilize Blockchain technology to support non-repudiation and tracking of trust relationships.
  •  
24.
  • Alani, Mohammed M., et al. (författare)
  • PAIRED: An Explainable Lightweight Android Malware Detection System
  • 2022
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 10, s. 73214-73228
  • Tidskriftsartikel (refereegranskat)abstract
    • With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating system for vehicles, tablets, smart appliances, and Internet of Things devices. Consequently, security challenges have arisen with the rapid adoption of the Android operating system. Thousands of malicious applications have been created and are being downloaded by unsuspecting users. This paper presents a lightweight Android malware detection system based on explainable machine learning. The proposed system uses the features extracted from applications to identify malicious and benign malware. The proposed system is tested, showing an accuracy exceeding 98% while maintaining its small footprint on the device. In addition, the classifier model is explained using Shapley Additive Explanation (SHAP) values.
  •  
25.
  • Alawadi, Sadi, 1983-, et al. (författare)
  • FedCSD : A Federated Learning Based Approach for Code-Smell Detection
  • 2024
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 12, s. 44888-44904
  • Tidskriftsartikel (refereegranskat)abstract
    • Software quality is critical, as low quality, or 'Code smell,' increases technical debt and maintenance costs. There is a timely need for a collaborative model that detects and manages code smells by learning from diverse and distributed data sources while respecting privacy and providing a scalable solution for continuously integrating new patterns and practices in code quality management. However, the current literature is still missing such capabilities. This paper addresses the previous challenges by proposing a Federated Learning Code Smell Detection (FedCSD) approach, specifically targeting 'God Class,' to enable organizations to train distributed ML models while safeguarding data privacy collaboratively. We conduct experiments using manually validated datasets to detect and analyze code smell scenarios to validate our approach. Experiment 1, a centralized training experiment, revealed varying accuracies across datasets, with dataset two achieving the lowest accuracy (92.30%) and datasets one and three achieving the highest (98.90% and 99.5%, respectively). Experiment 2, focusing on cross-evaluation, showed a significant drop in accuracy (lowest: 63.80%) when fewer smells were present in the training dataset, reflecting technical debt. Experiment 3 involved splitting the dataset across 10 companies, resulting in a global model accuracy of 98.34%, comparable to the centralized model's highest accuracy. The application of federated ML techniques demonstrates promising performance improvements in code-smell detection, benefiting both software developers and researchers. © 2013 IEEE.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-25 av 694
Typ av publikation
tidskriftsartikel (663)
forskningsöversikt (31)
Typ av innehåll
refereegranskat (682)
övrigt vetenskapligt/konstnärligt (12)
Författare/redaktör
Vyatkin, Valeriy (16)
Ottersten, Björn, 19 ... (16)
Al-Ansari, Nadhir, 1 ... (11)
Chatzinotas, S. (11)
Vinel, Alexey, 1983- (10)
Yaseen, Zaher Mundhe ... (10)
visa fler...
Svensson, Tommy, 197 ... (9)
Gidlund, Mikael, 197 ... (9)
Tenhunen, Hannu (9)
Schelén, Olov (9)
Vasilakos, Athanasio ... (8)
Wymeersch, Henk, 197 ... (8)
Wang, Lihui (8)
Mubeen, Saad (7)
Andersson, Karl, 197 ... (7)
Kebande, Victor R. (7)
Uz Zaman, Ashraf, 19 ... (7)
O'Nils, Mattias, 196 ... (7)
Loo, Jonathan (6)
Brunström, Anna, 196 ... (6)
Nikolakopoulos, Geor ... (6)
Vanfretti, Luigi (6)
Afzal, Wasif (6)
Dalarsson, Mariana (6)
Imran, Ali Shariq (6)
Kastrati, Zenun, 198 ... (6)
Al-Dhaqm, Arafat (6)
Glazunov, Andres Ala ... (6)
Flammini, Francesco, ... (5)
Tufvesson, Fredrik (5)
Rönnberg, Sarah (5)
Chamorro Vera, Harol ... (5)
Amin, Yasar (5)
Galar, Diego (5)
Daudpota, Sher Muham ... (5)
Mahmood, Aamir, 1980 ... (5)
Pettersson, Mats, 19 ... (5)
Hassan, Syed Ali (4)
Chatzinotas, Symeon (4)
Fischione, Carlo (4)
Liwicki, Marcus (4)
Yang, Jian, 1960 (4)
Ivashina, Marianna, ... (4)
Ikuesan, Richard Ade ... (4)
Liu, Hui (4)
Alibakhshikenari, Mo ... (4)
Bertilsson, Kent, 19 ... (4)
Alam, Farhan Muhamma ... (4)
Rusek, Fredrik (4)
Edfors, Ove (4)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (190)
Luleå tekniska universitet (103)
Chalmers tekniska högskola (81)
Mälardalens universitet (49)
Linköpings universitet (42)
Uppsala universitet (35)
visa fler...
Mittuniversitetet (32)
RISE (32)
Lunds universitet (30)
Umeå universitet (29)
Högskolan i Halmstad (23)
Blekinge Tekniska Högskola (22)
Karlstads universitet (21)
Linnéuniversitetet (17)
Högskolan i Skövde (12)
Stockholms universitet (11)
Malmö universitet (11)
Karolinska Institutet (10)
Göteborgs universitet (9)
Örebro universitet (6)
Högskolan Väst (3)
Högskolan i Borås (3)
Jönköping University (2)
VTI - Statens väg- och transportforskningsinstitut (2)
Högskolan i Gävle (1)
Handelshögskolan i Stockholm (1)
Försvarshögskolan (1)
Högskolan Dalarna (1)
visa färre...
Språk
Engelska (693)
Svenska (1)
Forskningsämne (UKÄ/SCB)
Teknik (473)
Naturvetenskap (257)
Samhällsvetenskap (23)
Medicin och hälsovetenskap (21)
Lantbruksvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy