Filter by subject:
- Information networks [1002]
- Computer and control engineering [1000]
- Computer applications [1000]
- Information science and documentation [1000]
- Information services and centres [1000]
- Computer software [668]
- Software techniques and systems [668]
- Data handling techniques [411]
- Electrical and electronic engineering [263]
- Communications [216]
- [212]
- http://iet.metastore.ingenta.com/content/subject/c7100,http://iet.metastore.ingenta.com/content/subject/c6130s,http://iet.metastore.ingenta.com/content/subject/b6200,http://iet.metastore.ingenta.com/content/subject/c7250,http://iet.metastore.ingenta.com/content/subject/c6170,http://iet.metastore.ingenta.com/content/subject/c6190,http://iet.metastore.ingenta.com/content/subject/c5600,http://iet.metastore.ingenta.com/content/subject/c6170k,http://iet.metastore.ingenta.com/content/subject/b6210,http://iet.metastore.ingenta.com/content/subject/c7400,http://iet.metastore.ingenta.com/content/subject/c5620,http://iet.metastore.ingenta.com/content/subject/b6210l,http://iet.metastore.ingenta.com/content/subject/c7800,http://iet.metastore.ingenta.com/content/subject/c1000,http://iet.metastore.ingenta.com/content/subject/c0000,http://iet.metastore.ingenta.com/content/subject/c7250r,http://iet.metastore.ingenta.com/content/subject/c1100,http://iet.metastore.ingenta.com/content/subject/e,http://iet.metastore.ingenta.com/content/subject/c6190j,http://iet.metastore.ingenta.com/content/subject/b6100,http://iet.metastore.ingenta.com/content/subject/c6150,http://iet.metastore.ingenta.com/content/subject/e0000,http://iet.metastore.ingenta.com/content/subject/c5620w,http://iet.metastore.ingenta.com/content/subject/b6250,http://iet.metastore.ingenta.com/content/subject/c7250n,http://iet.metastore.ingenta.com/content/subject/c7810,http://iet.metastore.ingenta.com/content/subject/c0200,http://iet.metastore.ingenta.com/content/subject/c6150n,http://iet.metastore.ingenta.com/content/subject/e0400,http://iet.metastore.ingenta.com/content/subject/c6180,http://iet.metastore.ingenta.com/content/subject/c6190v,http://iet.metastore.ingenta.com/content/subject/e0410,http://iet.metastore.ingenta.com/content/subject/c5200,http://iet.metastore.ingenta.com/content/subject/b0000,http://iet.metastore.ingenta.com/content/subject/c6110,http://iet.metastore.ingenta.com/content/subject/c7300,http://iet.metastore.ingenta.com/content/subject/c7410,http://iet.metastore.ingenta.com/content/subject/c0230,http://iet.metastore.ingenta.com/content/subject/c7810c,http://iet.metastore.ingenta.com/content/subject/b6250f,http://iet.metastore.ingenta.com/content/subject/b6150,http://iet.metastore.ingenta.com/content/subject/c1140,http://iet.metastore.ingenta.com/content/subject/c6130d,http://iet.metastore.ingenta.com/content/subject/c5260,http://iet.metastore.ingenta.com/content/subject/c6130m,http://iet.metastore.ingenta.com/content/subject/c6160,http://iet.metastore.ingenta.com/content/subject/c7330,http://iet.metastore.ingenta.com/content/subject/c1160,http://iet.metastore.ingenta.com/content/subject/b0100,http://iet.metastore.ingenta.com/content/subject/c6110b,http://iet.metastore.ingenta.com/content/subject/c1140z,http://iet.metastore.ingenta.com/content/subject/c6120,http://iet.metastore.ingenta.com/content/subject/c5260b,http://iet.metastore.ingenta.com/content/subject/c5640,http://iet.metastore.ingenta.com/content/subject/c7445,http://iet.metastore.ingenta.com/content/subject/e1000,http://iet.metastore.ingenta.com/content/subject/b6135,http://iet.metastore.ingenta.com/content/subject/b6150m,http://iet.metastore.ingenta.com/content/subject/b7000,http://iet.metastore.ingenta.com/content/subject/e0410d,http://iet.metastore.ingenta.com/content/subject/e0200,http://iet.metastore.ingenta.com/content/subject/e0410f,http://iet.metastore.ingenta.com/content/subject/e0430,http://iet.metastore.ingenta.com/content/subject/b8000,http://iet.metastore.ingenta.com/content/subject/c0300,http://iet.metastore.ingenta.com/content/subject/c7240,http://iet.metastore.ingenta.com/content/subject/c7140,http://iet.metastore.ingenta.com/content/subject/c3000,http://iet.metastore.ingenta.com/content/subject/c7410b,http://iet.metastore.ingenta.com/content/subject/e3000,http://iet.metastore.ingenta.com/content/subject/c1180,http://iet.metastore.ingenta.com/content/subject/c3300,http://iet.metastore.ingenta.com/content/subject/c0310,http://iet.metastore.ingenta.com/content/subject/c7130,http://iet.metastore.ingenta.com/content/subject/b8100,http://iet.metastore.ingenta.com/content/subject/b0200,http://iet.metastore.ingenta.com/content/subject/c7120,http://iet.metastore.ingenta.com/content/subject/d,http://iet.metastore.ingenta.com/content/subject/b0120,http://iet.metastore.ingenta.com/content/subject/c6180n,http://iet.metastore.ingenta.com/content/subject/c7480,http://iet.metastore.ingenta.com/content/subject/d2000,http://iet.metastore.ingenta.com/content/subject/b6400,http://iet.metastore.ingenta.com/content/subject/c0230b,http://iet.metastore.ingenta.com/content/subject/c6130b,http://iet.metastore.ingenta.com/content/subject/b8110,http://iet.metastore.ingenta.com/content/subject/c4000,http://iet.metastore.ingenta.com/content/subject/c5290,http://iet.metastore.ingenta.com/content/subject/c7180
- c7100,c6130s,b6200,c7250,c6170,c6190,c5600,c6170k,b6210,c7400,c5620,b6210l,c7800,c1000,c0000,c7250r,c1100,e,c6190j,b6100,c6150,e0000,c5620w,b6250,c7250n,c7810,c0200,c6150n,e0400,c6180,c6190v,e0410,c5200,b0000,c6110,c7300,c7410,c0230,c7810c,b6250f,b6150,c1140,c6130d,c5260,c6130m,c6160,c7330,c1160,b0100,c6110b,c1140z,c6120,c5260b,c5640,c7445,e1000,b6135,b6150m,b7000,e0410d,e0200,e0410f,e0430,b8000,c0300,c7240,c7140,c3000,c7410b,e3000,c1180,c3300,c0310,c7130,b8100,b0200,c7120,d,b0120,c6180n,c7480,d2000,b6400,c0230b,c6130b,b8110,c4000,c5290,c7180
- [212],[205],[168],[166],[165],[159],[144],[143],[138],[136],[131],[124],[116],[115],[113],[112],[110],[106],[99],[98],[98],[96],[91],[76],[76],[74],[72],[71],[70],[68],[68],[65],[63],[61],[57],[57],[57],[56],[54],[50],[48],[48],[48],[46],[46],[44],[44],[40],[39],[39],[38],[38],[36],[36],[36],[36],[35],[35],[34],[34],[33],[32],[32],[31],[31],[30],[29],[28],[28],[28],[27],[27],[26],[26],[25],[24],[23],[22],[21],[21],[21],[21],[20],[20],[20],[19],[19],[19],[19]
- /search/morefacet;jsessionid=3ceww1w5cav6p.x-iet-live-01
- /content/searchconcept;jsessionid=3ceww1w5cav6p.x-iet-live-01?option1=pub_concept&sortField=prism_publicationDate&pageSize=20&sortDescending=true&value1=c7210n&facetOptions=2&facetNames=pub_concept_facet&operator2=AND&option2=pub_concept_facet&value2=
- See more See less
Filter by content type:
Filter by publication date:
- 2019 [67]
- 2010 [61]
- 2012 [52]
- 2011 [49]
- 2020 [45]
- 2008 [43]
- 2018 [42]
- 2004 [41]
- 2000 [39]
- 2005 [39]
- 2015 [39]
- 1999 [37]
- 2017 [37]
- 2013 [32]
- 2006 [30]
- 2016 [30]
- 2001 [24]
- 2014 [23]
- 2002 [21]
- 2003 [21]
- 2007 [20]
- 2009 [18]
- 1998 [13]
- 2021 [1]
- See more See less
Filter by author:
- C. Edwards [17]
- K. Sangani [9]
- J. Hayes [8]
- A. Bodhani [5]
- Fangchun Yang [5]
- Junping Du [5]
- Sen Su [5]
- D. Vitaliev [4]
- Fuzhi Zhang [4]
- Kai Shuang [4]
- P. Marsh [4]
- R. Dettmer [4]
- Wanggen Wan [4]
- A. Messina [3]
- D. Bradbury [3]
- D. De Roure [3]
- J. Kim [3]
- J.P. Conti [3]
- Jiangong Li [3]
- Jianwei Li [3]
- Jing Lu [3]
- Jing Wang [3]
- L. Cheded [3]
- Lizhe Wang [3]
- M. Courtney [3]
- O. Toker [3]
- Osman Khalid [3]
- P. Dempsey [3]
- P. Hunter [3]
- P. Radanliev [3]
- R. Fan [3]
- Samee U. Khan [3]
- Xiaojun Wang [3]
- Xiaoqing Yu [3]
- Xuerong Gou [3]
- A. Holt [2]
- A. Hudson-Smith [2]
- A. Moyes [2]
- A. Zisman [2]
- Albert Y. Zomaya [2]
- B. Heubl [2]
- B. Knowles [2]
- Bo Zhang [2]
- C. Andrews [2]
- C. Hicks [2]
- C. Maple [2]
- C. Pantoja [2]
- C.W. Johnson [2]
- C.Y. Soh [2]
- Chun Che Fung [2]
- D. Hay [2]
- Dan Niu [2]
- Dhanalekshmi Gopinathan [2]
- Dongmei Zhang [2]
- E. Izquierdo [2]
- E. Mendes [2]
- Fan Li [2]
- Fatemeh Raji [2]
- Fatos Xhafa [2]
- Frances Hodgson [2]
- G. Clapperton [2]
- H. Al-Junaid [2]
- H.-C. Chao [2]
- Hao Chen [2]
- Hong Zhang [2]
- Hongke Zhang [2]
- Hua Zou [2]
- Huanhuan Liu [2]
- Hui Li [2]
- I. Kompatsiaris [2]
- J. Duffell [2]
- J.A. Bangham [2]
- J.K. Pollard [2]
- J.R.C. Nurse [2]
- Jaiteg Singh [2]
- Javid Taheri [2]
- Jia Wu [2]
- Jian Wang [2]
- Jiapeng Xiu [2]
- Jie Liu [2]
- K. Koh [2]
- K. Moskvitch [2]
- K. P. Soman [2]
- K.K. Tan [2]
- Kai Yang [2]
- Kangfeng Zheng [2]
- Kanghuai Liu [2]
- Khaled Salah [2]
- Kim-Kwang Raymond Choo [2]
- L. Collins [2]
- Lahouari Ghouti [2]
- Li Peng [2]
- Ling Wang [2]
- Linxia Zhong [2]
- Liping Chen [2]
- Lu Han [2]
- M. Da Costa-Abreu [2]
- M. Huth [2]
- M. Kumar [2]
- M. Mendoza [2]
- See more See less
Filter by access type:
E-learning has become an important part of our educational life with the development of e-learning systems and platforms and the need for online and remote learning. ICT and computational intelligence techniques are being used to design more intelligent and adaptive systems. However, the art of designing good real-time e-learning systems is difficult as different aspects of learning need to be considered including challenges such as learning rates, involvement, knowledge, qualifications, as well as networking and security issues. The earlier concepts of standalone integrated virtual e-learning systems have been greatly enhanced with emerging technologies such as cloud computing, mobile computing, big data, Internet of Things (IoT), AI and machine learning, and AR/VT technologies. With this book, the editors and authors wish to help researchers, scholars, professionals, lecturers, instructors, developers, and designers understand the fundamental concepts, challenges, methodologies and technologies for the design of performant and reliable intelligent and adaptive real time e-learning systems and platforms. This edited volume covers state of the art topics including user modeling for e-learning systems and cloud, IOT, and mobile-based frameworks. It also considers security challenges and ethical conduct using Blockchain technology.
Open Source Software (OSS) has become ubiquitous nowadays. It is crucial for the OSS project managers as well as developers to understand users' perception of quality to remain consistent with producing good quality software. To understand users' point of view, like many studies in the commercial product/service sectors which rely upon customer reviews to understand customer behaviour, the authors' main focus is to analyse user ratings and reviews of OSS projects that may represent user satisfaction for that particular software application. We have analysed 41,428 customer reviews (obtained from SourceForge.net) of 886 most popular OSS projects belonging to a specific domain and programming language. The results indicate that overall user ratings and reviews of the popular OSS projects contain a very positive sentiment and more frequent occurrence of emotions like joy, anticipation, and trust as compared to disgust, fear, and surprise. Further, we have examined that the affectiveness of customer reviews with respect to OSS popularity and quality aspects along with their programming languages and problem domains. The results show a stronger association of review affectiveness with the number of reviews than with the number of downloads of the OSS projects, and more downloads do not mean more reviews.
Software development is extremely complex, requiring collaboration between teams and developers who collaborate on various tasks; these activities lead to the generation of an implicit developer social network (DSN). The authors’ aim to understand the development process in terms of collaboration between developers. In this work, they conducted an empirical study on mining social collaboration patterns of DSNs for open source software projects based on an integrated approach involving the identification of global and local collaboration patterns among developers based on social network analysis. The bug tracking system-based DSN (BTS-DSN) is chosen as an example over the other DSNs since it incorporates larger collaboration activities and actors. The empirical results show that the DSNs, specifically BTS-DSN, exhibits three different coordination pattern levels (Plan, Aware, and Reflexive) based on their collaboration activities. The mean time to repair metric proves that the Reflexive level occupies the fastest bug fixing time, then the Plan level comes secondly, and lastly the Aware level. In addition, each level group shows different collaboration behaviours among developers; thus, this information can be useful as a resource for better understanding of developer collaboration and collaboration awareness.
Social media and other online websites have rich traffic information. How to extract and mine useful traffic information from online web data to address transportation problems has become a valuable and interesting research topic in current data-explosive era. In this chapter, we introduce a traffic analytic system with online web data. The proposed system can collect online data, use machine learning and natural language processing methods to extract traffic events, analyze traffic sentiment, and reason traffic scenarios. We also present some results based on the proposed system and techniques in practice.
A new revolution called Industry 4.0 (I4.0) is emerging and trending, in which industrial systems comprised of numerous sensors, actuators, and intelligent elements are interfaced and integrated into the smart factories with Internet communication technologies. I4.0 is currently driven by disruptive innovations that promise to provide opportunities for new value creations in all major market sectors. Cybersecurity is a common requirement in any Internet technology, thus it remains a major challenge to adopters of I4.0. This chapter provides a brief overview of a number of key components, principles, and paradigms of I4.0 technologies pertaining to cybersecurity. In addition, this chapter introduces industry-relevant cybersecurity vulnerabilities, risks, threats, and countermeasures with high-profile attack examples (e.g. BlackEnergy, Stuxnet) to help readers to appreciate and understand the state of the art. Finally, the chapter attempts to highlight the open issues and future directions of the system components in the context of cybersecurity for I4.0.
Industry 4.0 refers to automation and data exchange in manufacturing technologies. From innovative research, challenges, solutions and strategies to real-world case studies, the aim of this edited book is to focus on the nine pillars of technology that are supporting the transition to Industry 4.0 and smart manufacturing. The nine pillars include the internet of things, cloud computing, autonomous and robotics systems, big data analytics, augmented reality, cyber security, simulation, system integration, and additive manufacturing. A key role is played by the industrial IoTs and state-of-the-art technologies such as fog and edge computing, advanced data analytics, innovative data exchange models, artificial intelligence, machine learning, mobile and network technologies, robotics and sensors. This book is a useful resource for an audience of academic and industry researchers and engineers, as well as advanced students in the fields of information and communication technologies, robotics and automation, big data analytics and data mining, machine learning, artificial intelligence, AR/VR/ER, cybersecurity, cyber physical systems, sensing and robotics with a focus on Industry 4.0, and smart manufacturing.
Rapid and accurate detection of COVID-19 is a crucial step to control the virus. For this purpose, the authors designed a web-based COVID-19 detector using efficient dual attention networks, called ‘EDANet’. The EDANet architecture is based on inverted residual structures to reduce the model complexity and dual attention mechanism with position and channel attention blocks to enhance the discriminant features from the different layers of the network. Although the EDANet has only 4.1 million parameters, the experimental results demonstrate that it achieves the state-of-the-art results on the COVIDx data set in terms of accuracy and sensitivity of 96 and . The web application is available at the following link: https://covid19detector-cxr.herokuapp.com/.
The advent of high-speed internet connections, advanced video coding algorithms, and consumer-grade computers with high computational capabilities has led videostreaming-over-the-internet to make up the majority of network traffic. This effect has led to a continuously expanding video streaming industry that seeks to offer enhanced quality-of-experience (QoE) to its users at the lowest cost possible. Video streaming services are now able to adapt to the hardware and network restrictions that each user faces and thus provide the best experience possible under those restrictions. The most common way to adapt to network bandwidth restrictions is to offer a video stream at the highest possible visual quality, for the maximum achievable bitrate under the network connection in use. This is achieved by storing various preencoded versions of the video content with different bitrate and visual quality settings. Visual quality is measured by means of objective quality metrics, such as the mean squared error (MSE), peak signal-to-noise ratio (PSNR), structural similarity (SSIM) index, visual information fidelity (VIF), and others, which can be easily computed analytically. Nevertheless, it is widely accepted that although these metrics provide an accurate estimate of the statistical quality degradation, they do not reflect the viewer's perception of visual quality accurately. As a result, the acquisition of user ratings in the form of mean opinion scores (MOSs) remains the most accurate depiction of human-perceived video quality, albeit very costly and time consuming, and thus cannot be practically employed by video streaming providers that have hundreds or thousands of videos in their catalogues. A recent very promising approach for addressing this limitation is the use of machine learning techniques in order to train models that represent human video quality perception more accurately. To this end, regression techniques are used in order to map objective quality metrics to human video quality ratings, acquired for a large number of diverse video sequences. Results have been very promising, with approaches like the Video Multimethod Assessment Fusion (VMAF) metric achieving higher correlations to user-acquired MOS ratings compared to traditional widely used objective quality metrics. In this chapter, we examine the performance of VMAF and its potential as a replacement for common objective video quality metrics.
Growth in urbanisation, particularly in emerging economies, is causing increased traffic congestion and affecting environmental conditions in cities. Cities need to manage this growth in traffic in an efficient way. Intelligent infrastructure for traffic monitoring and sensing offers a potential solution, and so this book explores the prospective role of this approach in managing congestion, the established and emerging related technologies, and routes to effective implementation. Intelligent infrastructure will also play an important role in the future automation of vehicles. Onboard sensor technology is well-established, but higher levels of vehicle automation are difficult to achieve without additional sensing technology on the infrastructure side. Thanks to recent advances in device and software technology, new and innovative approaches to intelligent sensing infrastructure, both fixed and onboard, can be implemented. The development and deployment of automated vehicles is a hot topic, with early versions potentially entering the market within 5-8 years, so as an overview of developments in the field this book is timely and relevant. The book systematically covers the key elements of intelligent infrastructure. It begins with the architectures and projects in key regions, and then continues with coverage of novel technologies for vehicle, bicycle and pedestrian detection using different kinds of recognition technology. The third part describes technology for detecting traffic conditions such as incidents, illegal parking and adverse weather. Smart Sensing for Traffic Monitoring offers methodically presented information for researchers, practitioners, and advanced students with an interest in the technologies behind intelligent infrastructure and traffic monitoring.
Blockchain in healthcare plays a vital role in the form of encryption-based technology, which has been used to keep the patients' data in a secured and more distributed way. Blockchain technology in E-healthcare is also being used for digital payment systems that focus on cybersecurity, EHRs (electronic health records), patients data management, and so on. The framework has been designed to describe the major obstacles to the adaptation of blockchain technology in E -healthcare, such as data security, interoperability, data integrity, identity validation, and scalability. In addition, here comes the Ethereum as new technology based on blockchain technology. Ethereum is used for developing distributed applications (DApps) and replacing the Internet of third parties which store data, transactions and keep track. Using Ethereum, there is a chance to recreate the Internet without the involvement of third parties. The process of elimination of the third party could be implemented using smart contracts by creating trust, and Ethereum uses consensus proof -of -work (PoW), and Ethereum provides a peer -to -peer network to eliminate the involvement of third parties. The proposed system is a proof -of -concept implementation of a blockchain for research in clinical trials.
This chapter considers the business models and availability of services to support the uptake of social media data in traffic management. The focus is on Twitter as an example of a commonly available type of social media data. As we have seen in previous chapters, social media data, such as Twitter when accompanied by geographical information may be useful for estimating traffic characteristics. Information on traffic flow, delays, infrastructure, and environment-related traffic issues may be obtained from studying the textual content of the messages.
Technologies for traffic and travel information (TTI) have been evolving rapidly in recent years. This book offers an overview of three generations of TTI technology, beginning with the first generation of human to human information transmission. The second generation incorporated machine to human information exchange, with the development of classification and transmission protocols such as RDS-TMC and TPEG. A third generation of machine to machine communication is now emerging, disrupting TTI technology and creating the need for this new reference work, which covers gathering information from automated sensors, its digital processing and transmission, and its use by increasingly intelligent agents and vehicles. The book provides coverage of the following topics, written by a range of experts in their respective fields: road traffic data collection; road traffic news from the air; location referencing; digital coding, collation and exchange of traffic information; European developments in traffic and travel information; the role of the commercial sector in developing road traffic information in the UK and Europe; dynamic road traffic signage; smart motorway information development; contribution of cooperative ITS to road traffic and travel information; multi modal traffic and travel information; social media and traffic and travel information; social media services and business models; and finally traffic and travel information into the future. Providing essential information to researchers and industry professionals involved with or interested in technologies and organisations that provide or deliver travel information, this book could also be of interest to policymakers needing an overview of the evolution and recent developments of this field, and advanced students of subjects related to telecommunications with an interest in traffic information.
This chapter considers the use of publicly available social media data as a potential additional source of traffic information. Social media data with geographical information may be useful for estimating the speed of traffic. Information on traffic flow, delays, infrastructure and environment -related traffic issues may be obtained from studying the textual content of the messages. This chapter is concerned with assessing the relevance of these social media data to the needs of road administrations, particularly in the context of traffic management. We aim to focus on the potential of one commonly available type of social media data, Twitter, as a new source of travel time information. We consider the efficacy of the data, its availability and different business models for accessing and processing the data. A case study is used to provide detailed illustration of some of the issues with the functional contribution of Twitter data and the surrounding eco-system.
Delegation is a technique that allows a subject receiving a delegation (the delegatee) to act on behalf of the delegating subject (the delegator). Although the existing Key Aggregate Searchable Encryption (KASE) schemes support delegation of search rights over any set of ciphertexts using a key of constant-size, two critical issues still should be considered. Firstly, an adversary can intercept the aggregate key or query trapdoor from the insecure communication channels involving the cloud server and impersonate as an authorized user to the server for accessing the data. Secondly, the existing KASE schemes only discuss the delegation of rights from the data owner to other users. However, if a subject receiving a delegation cannot perform the time-critical task on the shared data because of the unavailability, it becomes necessary for the delegatee to further delegate his received rights to another user. In this paper, we propose a novel KASE scheme that allows a fine-grained multi-delegation, i.e., if the attributes of the delegatee satisfy the hidden access policy (defined by the data owner), the delegatee can delegate his received rights to another user, without compromising data privacy. The proposed scheme provides security against the impersonation attack by verifying the user's authentication.
Socialbots are intelligent software that controls all behaviour of fake accounts in an online social network. Since they are armed with detection evasion techniques, it is valuable to be able to determine the effectiveness of these techniques. In this study, an analytical model is developed to estimate a lower bound for the cost of automatic establishment of a socialbot network. Moreover, by considering fake accounts purchasing as an establishment strategy, an upper bound is suggested for acceptable costs. These two boundaries are compared to decide on the economic feasibility of a socialbot network design strategy. To demonstrate the practicality and effectiveness of the model, two case studies are investigated. They show that although designing a fully stealthy socialbot network is economically feasible, the infiltration time would be unacceptable. Thus, this ideal situation in which the establishment is fully stealthy, performs in a tolerable time, and satisfactory infiltration scale, is impractical. A possible solution could be achieved by reducing the time and cost in exchange for less stealthy behaviour while the infiltration scale kept unchanged. Since the model presents a trade-off between stealthiness, time, and cost, it is a useful tool facilitating the design of a possible strategy.
Security vulnerabilities in web traffic can directly lead to data leak. Preventing these data leaks to a large extent has become an important problem to solve. Besides, the accurate detection and prevention of abnormal changes in web traffic is of great importance. In this study, a hybrid approach, called C-NSA, based on the negative selection algorithm (NSA) and clonal selection algorithm (CSA) of artificial immune systems for the detection of abnormal web traffic on the network is proposed and a user-friendly application software is developed. The real and synthetic data in the Yahoo Webscope S5 dataset are used for web traffic and the data are split into windows using the window sliding. In the experimental studies, the abnormal web traffic data is detected by monitoring the changes in the number of activated detectors in the C-NSA. It is observed that the average accuracy performance of finding anomalies in real web traffic data is 94.30% and the overall classification accuracy is 98.22% based on proposed approach. In addition, false positive rate of the proposed approach using C-NSA is obtained as 0.029. In addition, the results in synthetic web traffic data using C-NSA are achieved as average 98.57% classification accuracy.
While great emphasis is given in the current literature about the potential of leveraging the cloud for testing purposes, the authors have scarce factual evidence from real-world industrial contexts about the motivations, drawbacks and benefits related to the adoption of automated cloud testing technology. In this study, the authors present an empirical study undertaken within the ongoing European Project ElasTest, which has developed an open source platform for end-to-end testing of large distributed systems. This study aims at validating the ElasTest solution, and consists of the assessment of four demonstrators belonging to different application domains, namely e-commerce, 5G networking, WebRTC and Internet of Things. For each demonstrator, they collected differing requirements, and achieved varying results, both positive and negative, showing that cloud testing needs careful assessment before adoption.
With the development of network services and location-based systems, many mobile applications begin to use users’ geographical location to provide better services. In terms of social networks, geographical location is actively shared by users. In some applications with recommendation services, before the geographical location recommendation is provided, the authors have to obtain user's permission. This kind of social network integrated with geographical location information is called location-based social networks (abbreviate for LBSNs). In the LBSN, each user has location information when he or she checked in hotels or feature spots. Based on this information, they can identify user's trajectory of movement behaviour and activity patterns. In general, if there is friendship between two users, their trajectories in reality are likely to be similar. In this study, according to user's geographical location information over a period of time, they explore whether there exists friendly relationship between two users based on trajectory similarity and the structure theory of graphs. In particular, they propose a new factor function and a factor graph model based on user's geographical location to predict the friendship between two users in the real LBSN.
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly. With the anonymous structure of the internet, attackers attempt to deceive the end-users through different forms namely phishing, malware, SQL injection, man-in-the-middle, domain name system tunnelling, ransomware, web trojan, and so on. Amongst them, phishing is the most deceiving attack, which exploits the vulnerabilities in the end-users. Phishing is often done through emails and malicious websites to lure the user by posing themselves as a trusted entity. Security experts have been proposing many anti-phishing techniques. Till today there is no single solution that is capable of mitigating all the vulnerabilities. A systematic review of current trends in web phishing detection techniques is carried out and a taxonomy of automated web phishing detection is presented. The objective of this study is to acknowledge the status of current research in automated web phishing detection and evaluate their performance. This study also discusses the research avenues for future investigation.
This edited book explores the use of mobile technologies such as phones, drones, robots, apps, and wearable monitoring devices for improving access to healthcare for socially disadvantaged populations in remote, rural or developing regions. This book brings together examples of large scale, international projects from developing regions of China and Belt and Road countries from researchers in Australia, Bangladesh, Denmark, Norway, Japan, Spain, Thailand and China. The chapters discuss the challenges presented to those seeking to deploy emerging mobile technologies (e.g., smartphones, IoT, drones, robots etc.) for healthcare (mHealth) in developing countries and discuss the solutions undertaken in these case study projects. This book brings together joint work in mHealth projects across multiple disciplines (software, healthcare, mobile communications, entrepreneurship and business and social development). Bringing together research from different institutions and disciplines, the editors illustrate the technical and entrepreneurial aspects of using mobile technologies for healthcare development in remote regions. Chapters are grouped into five key themes: the global challenge, portable health clinics, sustainable and resilient mHealth services, mHealth for the elderly, and mHealth for chronic illnesses. The book will be of particular interest to engineers, entrepreneurs, NGOs and researchers working in healthcare in sustainable development settings.