Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied ...for IoT traffic identification in IoT risk management. However, due to inaccurate feature selection, ML techniques misclassify a number of malicious traffic in smart IoT network for secured smart applications. To address the problem, it is very important to select features set that carry enough information for accurate smart IoT anomaly and intrusion traffic identification. In this paper, we firstly applied bijective soft set for effective feature selection to select effective features, and then we proposed a novel CorrACC feature selection metric approach. Afterward, we designed and developed a new feature selection algorithm named Corracc based on CorrACC, which is based on wrapper technique to filter the features and select effective feature for a particular ML classifier by using ACC metric. For the evaluation our proposed approaches, we used four different ML classifiers on the BoT-IoT dataset. Experimental results obtained by our algorithms are promising and can achieve more than 95% accuracy.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
The aeroelastic analysis has become important for aerodynamical model of wind turbine in predicting the wind turbine; such phenomenon is based on aerodynamic performance to have accuracy and ...feasibility through modeling of fractal and fractional differential techniques. In this context, the mathematical modeling is developed based on fractal and fractional differential techniques for three‐dimensional nonautonomous model of a permanent magnet synchronous generator. The fractal and fractional differential techniques so called Caputo, Caputo–Fabrizio and Atangana–Baleanu differential operators have been invoked for the controllability of the stability of system. Numerical schemes for the mathematical model of wind turbine have been established via Adams–Bashforth–Moulton method. The comparative analysis of mathematical model of wind turbine is tackled by means of classical, fractal, fractional and fractal–fractional techniques through chaotic behavior. The role of chaotic oscillations has been depicted on the basis of parametric study of tip speed ratio, pitch angle, drag coefficients, power coefficient, air density and rotor angular speed.
Full text
Available for:
FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
In order to meet the requirements of massively connected devices, different quality of services (QoS), various transmit rates, and ultra-reliable and low latency communications (URLLC) in ...vehicle-to-everything (V2X) communications, we introduce a full duplex non-orthogonal multiple access (FD-NOMA)-based decentralized V2X system model. We, then, classify the V2X communications into two scenarios and give their exact capacity expressions. To solve the computation complicated problems of the involved exponential integral functions, we give the approximate closed-form expressions with arbitrary small errors. Numerical results indicate the validness of our derivations. Our analysis has that the accuracy of our approximate expressions is controlled by the division of <inline-formula> <tex-math notation="LaTeX">\frac {\pi }{2} </tex-math></inline-formula> in the urban and crowded scenarios, and the truncation point <inline-formula> <tex-math notation="LaTeX">{T} </tex-math></inline-formula> in the suburban and remote scenarios. Numerical results manifest that: 1) increasing the number of V2X device, NOMA power, and Rician factor value yields a better capacity performance; 2) effect of FD-NOMA is determined by the FD self-interference and the channel noise; and 3) FD-NOMA has a better latency performance compared with other schemes.
The newly generalized energy storage component, namely, memristor, which is a fundamental circuit element so called universal charge‐controlled mem‐element, is proposed for controlling the analysis ...and coexisting attractors. The governing differential equations of memristor are highly nonlinear for mathematical relationships. The mathematical model of memristor is established in terms of newly defined fractal‐fractional differential operators so called Atangana‐Baleanu, Caputo‐Fabrizio, and Caputo fractal‐fractional differential operator. A novel numerical approach is developed for the governing differential equations of memristor on the basis of Atangana‐Baleanu, Caputo‐Fabrizio, and Caputo fractal‐fractional differential operator. We discussed chaotic behavior of memristor under three criteria such as (i) varying fractal order, we fixed fractional order; (ii) varying fractional order, we fixed fractal order; and (ii) varying fractal and fractional orders simultaneously. Our investigated graphical illustrations and simulated results via MATLAB for the chaotic behaviors of memristor suggest that newly presented Atangana‐Baleanu, Caputo‐Fabrizio, and Caputo fractal‐fractional differential operators generate significant results as compared with classical approach.
Full text
Available for:
FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
The quality of electric induction motors for its high number of applications can be compared with traditional motor for the check of accuracy of physical and psychological discomforts. A mathematical ...analysis is performed to study the chaotic phenomena of drilling system actuated by induction motor by means of newly defined fractal–fractional differentiations. The mathematical modeling is described by focusing the drilling system consisting of two disks connected to each other by a steel string in which upper disk is actuated by DC‐motor and lower disk with friction force. The derived dynamical mathematical model of drilling system actuated by induction motor based on ordinary differential equations is fractionalized with fractal differential operator of Atangana–Baleanu. For the sake of confirmation of drill string failures and breakdowns, the numerical simulations are performed via novel effective technique of linear multi‐step integration method (Adams–Bashforth–Moulton method). At the end, the fractional, fractal, and fractal–fractional chaotic behaviors and phase portraits have disclosed various resemblances and metamorphoses.
Full text
Available for:
FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could ...compromise the confidentiality, integrity, and availability of connected systems. Developing a secure IoT ecosystem is a daunting challenge that requires a systematic and holistic approach to identify and mitigate potential security threats. Cybersecurity research considerations play a critical role in this regard, as they provide the foundation for designing and implementing security measures that can address emerging risks. To achieve a secure IoT ecosystem, scientists and engineers must first define rigorous security specifications that serve as the foundation for developing secure devices, chipsets, and networks. Developing such specifications requires an interdisciplinary approach that involves multiple stakeholders, including cybersecurity experts, network architects, system designers, and domain experts. The primary challenge in IoT security is ensuring the system can defend against both known and unknown attacks. To date, the IoT research community has identified several key security concerns related to the architecture of IoT systems. These concerns include issues related to connectivity, communication, and management protocols. This research paper provides an all-inclusive and lucid review of the current state of anomalies and security concepts related to the IoT. We classify and analyze prevalent security distresses regarding IoT's layered architecture, including connectivity, communication, and management protocols. We establish the foundation of IoT security by examining the current attacks, threats, and cutting-edge solutions. Furthermore, we set security goals that will serve as the benchmark for assessing whether a solution satisfies the specific IoT use cases.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this ...purpose, numerous machine-learning (ML) technique models are presented by many researchers to block malicious traffic flows in the IoT network. However, due to the inappropriate feature selection, several ML models prone misclassify mostly malicious traffic flows. Nevertheless, the significant problem still needs to be studied more in-depth that is how to select effective features for accurate malicious traffic detection in the IoT network. To address the problem, a new framework model is proposed. First, a novel feature selection metric approach named CorrAUC is proposed, and then based on CorrAUC, a new feature selection algorithm named CorrAUC is developed and designed, which is based on the wrapper technique to filter the features accurately and select effective features for the selected ML algorithm by using the area under the curve (AUC) metric. Then, we applied the integrated TOPSIS and Shannon entropy based on a bijective soft set to validate selected features for malicious traffic identification in the IoT network. We evaluate our proposed approach by using the Bot-IoT data set and four different ML algorithms. The experimental results analysis showed that our proposed method is efficient and can achieve >96% results on average.
To improve the quality of service (QoS) needed by several applications areas, the Internet of Things (IoT) tasks are offloaded into the fog computing instead of the cloud. However, the availability ...of ongoing energy heads for fog computing servers is one of the constraints for IoT applications because transmitting the huge quantity of the data generated using IoT devices will produce network bandwidth overhead and slow down the responsive time of the statements analyzed. In this article, an energy-aware model basis on the marine predators algorithm (MPA) is proposed for tackling the task scheduling in fog computing (TSFC) to improve the QoSs required by users. In addition to the standard MPA, we proposed the other two versions. The first version is called modified MPA (MMPA), which will modify MPA to improve their exploitation capability by using the last updated positions instead of the last best one. The second one will improve MMPA by the ranking strategy based reinitialization and mutation toward the best, in addition to reinitializing, the half population randomly after a predefined number of iterations to get rid of local optima and mutated the last half toward the best-so-far solution. Accordingly, MPA is proposed to solve the continuous one, whereas the TSFC is considered a discrete one, so the normalization and scaling phase will be used to convert the standard MPA into a discrete one. The three versions are proposed with some other metaheuristic algorithms and genetic algorithms based on various performance metrics such as energy consumption, makespan, flow time, and carbon dioxide emission rate. The improved MMPA could outperform all the other algorithms and the other two versions.
This study aims to prevail the digital information literacy skills among library and information professionals working in different universities of Sindh, Pakistan. For data collection, survey ...method, and a questionnaire comprised of close-ended questions were used. The population of the study consisted of 138 library professionals working in different public and private universities and institutes of Sindh, a province of Pakistan. The results of study show that the greater part of respondents had good digital information literacy skills regarding the use, understanding, evaluation and communication the digital information. With this, majority of the participants were either self-taught or learn through conferences, workshops, friends and colleagues. The barriers in obtaining digital information literacy skills were found; lack of funds, un-updated LIS curriculum, tough working routine, lack of support from higher authorities. Moreover, this study provides an understanding as to how universities and institutes can strength and up-skill their library professionals.
Herein, we report a sensitive electrochemical platform prepared by modifying the electrode surface with copper-doped zinc oxide nanoparticles; these nanoparticles were prepared
a green synthetic ...approach using the extract of
leaves and multiwalled carbon nanotubes (MWCNTs). For the best response of the electrode modifier, a number of experimental conditions were optimized to obtain the most intense signal of the target analyte Coomassie brilliant blue using a rapid analysis technique square wave voltammetry. The designed sensor displayed remarkable sensitivity for Coomassie brilliant blue with a detection limit of 0.1 nM under the optimized conditions. Moreover, the repeatability, specificity and reproducibility of the designed sensor demonstrated its potential for practical applications. The sensing platform was also used for monitoring the degradation kinetics of the Coomassie brilliant blue dye. Catalytic degradation of the dye was performed using the synergistic effect of Cu-ZnO NPs together with Fenton reagent. The dye degraded by 96% in 60 minutes under neutral conditions, which is one of the main achievements of this work that has never been reported. The photocatalytic breakdown of Coomassie brilliant blue was also monitored using UV-visible spectroscopy. The degradation kinetics results of both techniques agreed well. The adsorption of Coomassie brilliant blue using ZnO NPs was monitored spectrophotometrically. The adsorption data were fitted in a pseudo-second order kinetic model by following the Langmuir isotherm at lower concentration and Freundlich isotherm at higher concentration.
Full text
Available for:
IJS, KILJ, NUK, UL, UM, UPUK