0000000000242683
AUTHOR
Jawaid Iqbal
Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction
A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NIDS) prevent intrusions into a network and preserve the network’s integrity, availability, and confidentiality. Much work has been done on NIDS but there are still improvements needed in reducing false alarms and increasing threat detection accuracy. Recently advanced approaches such as deep learning (DL) and machine learning (ML) have been implemen…
Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things
Automation can now be found in nearly every industry. However, home automation has yet to reach Pakistan. This paper presents an Internet of Things smart kitchen project that includes automation and monitoring. In this project, a system was developed that automatically detects the kitchen temperature. It also monitors the humidity level in the kitchen. This system includes built-in gas detection sensors that detect any gas leaks in the kitchen and notify the user if the gas pressure in the kitchen exceeds a certain level. This system also allows the user to remotely control appliances such as freezers, ovens, and air conditioners using a mobile phone. The user can control gas levels using t…
Optimizing the Performance of Data Warehouse by Query Cache Mechanism
Fast access of data from Data Warehouse (DW) is a need for today’s Business Intelligence (BI). In the era of Big Data, the cache is regarded as one of the most effective techniques to improve the performance of accessing data. DW has been widely used by several organizations to manage data and use it for Decision Support System (DSS). Many methods have been used to optimize the performance of fetching data from DW. Query cache method is one of those methods that play an effective role in optimization. The proposed work is based on a cache-based mechanism that helps DW in two aspects: the first one is to reduce the execution time by directly accessing records from cache memory, and th…
Anomaly Detection in Traffic Surveillance Videos Using Deep Learning
In the recent past, a huge number of cameras have been placed in a variety of public and private areas for the purposes of surveillance, the monitoring of abnormal human actions, and traffic surveillance. The detection and recognition of abnormal activity in a real-world environment is a big challenge, as there can be many types of alarming and abnormal activities, such as theft, violence, and accidents. This research deals with accidents in traffic videos. In the modern world, video traffic surveillance cameras (VTSS) are used for traffic surveillance and monitoring. As the population is increasing drastically, the likelihood of accidents is also increasing. The VTSS is used to detect abno…
Internet of Things-Based Fire Alarm Navigation System: A Fire-Rescue Department Perspective
In the past few years, fire alarm systems have become increasingly sophisticated and more capable and reliable. The two main objectives are the protection of life and property. As a result of state and local codes, fire protection has become more concerned with life safety over the past two decades. Several safety measures have been implemented to address the problems caused by the fires and reduce the number of fatalities and property damage. Our project is to develop and review a fire alarm navigation system and application that uses the internet of things. Fire alarm systems are designed to warn people about fires in advance so that they can evacuate the fire-affected area and take immed…
A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks
Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very sensitive and unique, the authentication of users is very important to access the data and information. UWSNs have unique communication and computation needs that are not met by the existing digital signature techniques. As a result, a lightweight signature scheme is required to meet the communication and computation requirements. In this researc…
A Conceptual Model for Blockchain-Based Agriculture Food Supply Chain System
In agriculture supply chain management, traceability is a crucial aspect to ensure food safety for increasing customer loyalty and satisfaction. Lack of quality assurance in centralized data storage makes us move towards a new approach based on a decentralized system in which transparency and quality assurance is guaranteed throughout the supply chain from producer to consumer. The current supply chain model has some disadvantages like a communication gap between the entities of the supply chain and no information about the travel history and origin of the product. The use of technology improves the communication and relation between various farmers and stakeholders. Blockchain technology a…
A Machine Learning in Binary and Multiclassification Results on Imbalanced Heart Disease Data Stream
In medical filed, predicting the occurrence of heart diseases is a significant piece of work. Millions of healthcare-related complexities that have remained unsolved up until now can be greatly simplified with the help of machine learning. The proposed study is concerned with the cardiac disease diagnosis decision support system. An OpenML repository data stream with 1 million instances of heart disease and 14 features is used for this study. After applying to preprocess and feature engineering techniques, machine learning approaches like random forest, decision trees, gradient boosted trees, linear support vector classifier, logistic regression, one-vs-rest, and multilayer perceptron are u…
In the Direction of Service Guarantees for Virtualized Network Functions
The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have significant limitations when it comes to networking as there is no support for guaranteeing that network functions meet their service requirements. In this paper, we present a design for providing service guarantees to virtualized network functions based on rate control. The design is a combination of rate regulation through token bucket filters and the regular scheduling mechanisms in operating systems. It has the attractive property that traffic profi…
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…
A Novel Optimization for GPU Mining Using Overclocking and Undervolting
Cryptography and associated technologies have existed for a long time. This field is advancing at a remarkable speed. Since the inception of its initial application, blockchain has come a long way. Bitcoin is a cryptocurrency based on blockchain, also known as distributed ledger technology (DLT). The most well-known cryptocurrency for everyday use is Bitcoin, which debuted in 2008. Its success ushered in a digital revolution, and it currently provides security, decentralization, and a reliable data transport and storage mechanism to various industries and companies. Governments and developing enterprises seeking a competitive edge have expressed interest in Bitcoin and other cryptocurrencie…
Wildfire Monitoring Based on Energy Efficient Clustering Approach for FANETS
Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made to detect forest fires using a variety of approaches, including optical fire sensors, and satellite-based technologies, all of which have been unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is a thriving field and can be used successfully. This paper describes a unique clustering approach that identifies the presence of a fire zone in a forest and transfers all sensed data to a base station as soon as feasible via wireless communication. The fire department takes the required steps to prevent the spread of the fire. It is proposed in this study…
An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain
In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs fac…
Blockchain-Based Land Registration System: A Conceptual Framework
Land registration authorities are frequently held accountable for the alleged mismanagement and manipulation of land records in various countries. Pakistan’s property records are especially vulnerable to falsification and corruption because of the country’s poverty. Different parties therefore claim varying degrees of authority over a specific piece of land. Given the fact that this data has been consolidated, it has become significantly more vulnerable to security threats. The goal of decentralized system research has been to increase the reliability of these systems. In order to fix the flaws of centralized systems, blockchain-based decentralized systems are currently in development. By u…
Effectively Predicting the Presence of Coronary Heart Disease Using Machine Learning Classifiers
Coronary heart disease is one of the major causes of deaths around the globe. Predicating a heart disease is one of the most challenging tasks in the field of clinical data analysis. Machine learning (ML) is useful in diagnostic assistance in terms of decision making and prediction on the basis of the data produced by healthcare sector globally. We have also perceived ML techniques employed in the medical field of disease prediction. In this regard, numerous research studies have been shown on heart disease prediction using an ML classifier. In this paper, we used eleven ML classifiers to identify key features, which improved the predictability of heart disease. To introduce the prediction …
Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain
Wireless body sensor networks (WBSNs) pose significant security and privacy risks. The Medical Server (MS) will only allow legitimate stakeholders access to confidential patient medical records when successful mutual authentication between all registered users and the MS has been confirmed using preset secret attributes. This paper proposes a novel approach to overcome the security and privacy problems in WBSNs by using CP-ABE and a consortium blockchain for key management and authentication. In this paper, a fixed-size session key is computed by utilizing several attribute base rules and AND/OR logic gate combinations. IEEE 802.15.6 is also used to transmit the encoded patient data from th…