This paper proposes an adaptive routing and spectrum assignment protocol for heterogeneous Full-duplex (FD) and half-duplex (HD) cognitive radio (CR) networks. The key design goal of the developed ...protocol is to select a path between a source-destination pair, and to optimally assign channels to each hop along the selected path. One main feature of the proposed protocol is that it takes into account the dynamic activity of Primary Users (PUs) over radio channels. To that end, radio channels are characterized in terms of their average availability-time, and the proposed protocol selects the channels with maximum availability-time. Another main feature of the proposed protocol is considering network heterogeneity, where the connected devices may have HD or FD transmission capabilities. The proposed protocol follows a segmentation strategy that relies on the existence of HD nodes. It choses the path with least number of path-segments (and hence minimum HD nodes) to minimize the likelihood of time-shared transmissions, and hence improves network throughput. Compared to existing FD-based schemes, simulation results show that the proposed routing scheme provides considerable enhancement on the overall network performance.
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an ...effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT-cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system. The proposed hybrid cloud environment is aimed at protecting organizations' data in a highly secure manner. The hybrid cloud environment is a combination of private and public cloud. Our IoT devices are divided into sensitive and nonsensitive devices. Sensitive devices generate sensitive data, such as healthcare data; whereas nonsensitive devices generate nonsensitive data, such as home appliance data. IoT devices send their data to the cloud via a gateway device. Herein, sensitive data are split into two parts: one part of the data is encrypted using RC6, and the other part is encrypted using the Fiestel encryption scheme. Nonsensitive data are encrypted using the Advanced Encryption Standard (AES) encryption scheme. Sensitive and nonsensitive data are respectively stored in private and public cloud to ensure high security. The use of multifactor authentication to access the data stored in the cloud is also proposed. During login, data users send their registered credentials to the Trusted Authority (TA). The TA provides three levels of authentication to access the stored data: first-level authentication - read file, second-level authentication - download file, and third-level authentication - download file from the hybrid cloud. We implement the proposed cloud-IoT architecture in the NS3 network simulator. We evaluated the performance of the proposed architecture using metrics such as computational time, security strength, encryption time, and decryption time.
Online reviews significantly impact consumers who are purchasing or seeking services via the Internet. Businesses and review platforms need to manage these online reviews to avoid misleading ...customers through fake ones. This necessitates developing intelligent solutions to detect these fake reviews and prevent their negative impact on businesses and customers. Therefore, many fake review detection models have been proposed to help distinguish fake reviews from genuine ones. However, these techniques depend on a limited perspective of features, mainly review content, to detect fake reviews, leading to poor performance in discovering the new patterns of fake review content and the dynamic behaviour of spammers. Therefore, there is still a need to develop new solutions to detect the new patterns of fake reviews. Hence, this paper proposes an explainable multi-view deep learning model to identify fake reviews based on different feature perspectives and classifiers. The proposed model can extract essential features from different perspectives, including review content, reviewer data, and product description. Moreover, we employ an ensemble approach that combines three popular deep learning algorithms: Bi-LSTM, CNN, and DNN, to enhance the performance of the fake review detection model. The results of two real-life datasets presented demonstrated the efficiency of our proposed model, where it outperformed the state-of-the-art methods with improvements ranging from 1% to 7% in terms of the AUC metric. To provide visibility into the outcomes of our proposed model and demonstrate the trust and transparency in the obtained results, we also offer a comprehensive explanation for our model results using Shapely Additive Explanations (SHAP) method and attention techniques. The experimental results prove that our proposed model can provide reasonable explanations that help users understand why specific reviews are classified as fake.
•Comprehensive examination of various methodologies in the identification of false reviews.•A novel and practical approach that leverages transformer architecture to identify fake reviews.•A ...comprehensive assessment conducted on benchmark datasets with highly favourable outcomes.
Internet reviews significantly influence consumer purchase decisions across all types of goods and services. However, fake reviews can mislead both customers and businesses. Many machine learning (ML) techniques have been proposed to detect fake reviews, but they often suffer from poor accuracy due to their focus on linguistic features rather than semantic content. This paper presents a novel semantic- and linguistic-aware model for fake review detection that improves accuracy by leveraging advanced transformer architecture. Our model integrates RoBERTa with an LSTM layer, enabling it to capture intricate patterns within fake reviews. Unlike previous methods, our approach enhances the robustness of fake review detection and authentic behavior profiling. Experimental results on semi-real benchmark datasets show that our model significantly outperforms state-of-the-art methods, achieving 96.03 % accuracy on the OpSpam dataset and 93.15 % on the Deception dataset. To further enhance transparency and credibility, we utilize Shapley Additive Explanations (SHAP) and attention techniques to clarify our model's classifications. The empirical findings indicate that our proposed model can offer rational explanations for classifying specific reviews as fake.
•We have investigated the literature and generated a survey regarding the use of blockchain as a tool for application within information systems.•An extensive comparison, clustering, and ...classification have been carried out regarding the current use of blockchain within information systems.•We conducted the first blockchain-based information system analysis and addressed all issues in the information systems management area.
Blockchain technologies have grown in prominence in recent years, with many experts citing the potential applications of the technology in regard to different aspects of any industry, market, agency, or governmental organizations. In the brief history of blockchain, an incredible number of achievements have been made regarding how blockchain can be utilized and the impacts it might have on several industries. The sheer number and complexity of these aspects can make it difficult to address blockchain potentials and complexities, especially when trying to address its purpose and fitness for a specific task. In this survey, we provide a comprehensive review of applying blockchain as a service for applications within today’s information systems. The survey gives the reader a deeper perspective on how blockchain helps to secure and manage today information systems. The survey contains a comprehensive reporting on different instances of blockchain studies and applications proposed by the research community and their respective impacts on blockchain and its use across other applications or scenarios. Some of the most important findings this survey highlights include the fact that blockchain’s structure and modern cloud- and edge-computing paradigms are crucial in enabling a widespread adaption and development of blockchain technologies for new players in today unprecedented vibrant global market. Ensuring that blockchain is widely available through public and open-source code libraries and tools will help to ensure that the full potential of the technology is reached and that further developments can be made concerning the long-term goals of blockchain enthusiasts.
The interchangeably connected Web technologies and the advancements that accompany the semantic web content's leaps, have raised many challenges in the results' retrieval process especially for the ...Arabic Language. This research targets an important, yet insufficiently precedent, area in using Linked Open Data (LOD) for Automatic Question Answering systems in the Arabic Language. The significance of work presented, comes from its ability to overcome many challenges in querying Arabic content. Some of these challenges are: (a) bridging the gap between natural language and linked data by mapping users' queries to a standard semantic web query language such as SPARQL, (b) facilitating multilingual access to semantic data, and (c) maintaining the quality of data. Another challenging aspect was the lack of related work and publicly available resources for Arabic Question Answering Systems over Linked Data, despite the vastly growing Arabic corpus on the web. This paper presents a novel approach that targets Automatic Arabic Questions' Answering Systems whilst bypassing many featured challenges in the field. A hybrid approach that evaluates the effectiveness of using LOD to automatically answer Arabic questions is developed. The approach is developed to map users' questions in Modern Standard Arabic, to a standard query language for LOD (i.e. SPARQL) through: (i) extracting entities from questions and linking them over the web using Named-Entity Recognition and Disambiguation (NER/NED), and (ii) extracting properties among extracted named entities using a dependency parsing approach integrated with Wikidata ontology. To evaluate our proposed system, an Arabic questions dataset was created including: (a) Question body in Arabic language, (b) Question type, (c) SPARQL Query formulation, and (d) Question answer. Evaluation results are promising with a Precision of 84%, a Recall of 81.3%, and an F-Measure of 82.8%.
The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms ...are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud platforms, how to achieve secure storage, access control, information update and deletion for smart factory data, as well as the tracking and revocation of malicious users has become an urgent problem. To solve these problems, in this article, a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories. The blockchain first performs unified identity authentication, and stores all public keys, user attribute sets, and revocation list. The system administrator then generates system parameters and issues private keys to users. The domain administrator is responsible for formulating domain security and privacy-protection policies, and performing encryption operations. If the attributes meet the access policies and the user's ID is not in the revocation list, they can obtain the intermediate decryption parameters from the edge/cloud servers. Malicious users can be tracked and revoked during all stages if needed, which ensures the system security under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and can resist multiple attacks. The evaluation has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages.
Federated Learning (FL) has been foundational in improving the performance of a wide range of applications since it was first introduced by Google. Some of the most prominent and commonly used ...FL-powered applications are Android’s Gboard for predictive text and Google Assistant. FL can be defined as a setting that makes on-device, collaborative Machine Learning possible. A wide range of literature has studied FL technical considerations, frameworks, and limitations with several works presenting a survey of the prominent literature on FL. However, prior surveys have focused on technical considerations and challenges of FL, and there has been a limitation in more recent work that presents a comprehensive overview of the status and future trends of FL in applications and markets. In this survey, we introduce the basic fundamentals of FL, describing its underlying technologies, architectures, system challenges, and privacy-preserving methods. More importantly, the contribution of this work is in scoping a wide variety of FL current applications and future trends in technology and markets today. We present a classification and clustering of literature progress in FL in application to technologies including Artificial Intelligence, Internet of Things, blockchain, Natural Language Processing, autonomous vehicles, and resource allocation, as well as in application to market use cases in domains of Data Science, healthcare, education, and industry. We discuss future open directions and challenges in FL within recommendation engines, autonomous vehicles, IoT, battery management, privacy, fairness, personalization, and the role of FL for governments and public sectors. By presenting a comprehensive review of the status and prospects of FL, this work serves as a reference point for researchers and practitioners to explore FL applications under a wide range of domains.
•Draw the big picture of the fundamental of federated machine learning.•Presenting the most prominent federated learning applications and shows other potential use cases.•Provide a range of future applications and directions for the research in the federated machine learning.
The emerging advances in personal devices and privacy concerns have given the rise to the concept of Federated Learning. Federated Learning proves its effectiveness and privacy preservation through ...collaborative local training and updating a shared machine learning model while protecting the individual data-sets. This article investigates a new type of vehicular network concept, namely a Federated Vehicular Network (FVN), which can be viewed as a robust distributed vehicular network. Compared to traditional vehicular networks, an FVN has centralized components and utilizes both DSRC and mmWave communication to achieve more scalable and stable performance. As a result, FVN can be used to support data-/computation-intensive applications such as distributed machine learning and Federated Learning. The article first outlines the enabling technologies of FVN. Then, we briefly discuss the high-level architecture of FVN and explain why such an architecture is adequate for Federated Learning. In addition, we use auxiliary Blockchain-based systems to facilitate transactions and mitigate malicious behaviors. Next, we discuss in detail one key component of FVN, a federated vehicular cloud (FVC), that is used for sharing data and models in FVN. In particular, we focus on the routing inside FVCs and present our solutions and preliminary evaluation results. Finally, we point out open problems and future research directions of this disruptive technology.