Machine learning techniques have shown promising results in classifying NFR. However, the lack of annotated training data in the domain of requirement engineering poses challenges to the accuracy, ...generalization, and reliability of ML-based methods, including overfitting, poor performance, biased models, and out-of-vocabulary issues. This study presents an approach for the classification of non-functional requirements (NFRs) in software requirements specification documents by extracting features from word embedding pre-trained models. The novel algorithms are specifically designed to extract relevant representative features from pre-trained word embedding models. In addition, each pre-trained model is paired with the four tailored neural network architectures for NFR classification including RPCNN, RPBiLSTM, RPLSTM, and RPANN. This combination results in the creation of twelve unique models, each with its unique configuration and characteristics. The results show that the integration of pre-trained GloVe models with RPBiLSTM demonstrates the highest performance, achieving an impressive average Area Under the Curve (AUC) score of 96%, a precision of 85%, and recall of 82%, highlighting its strong ability to accurately classify NFRs. Furthermore, among the integration of pre-trained Word2Vec models, RPLSTM achieved notable results, with an AUC score of 95%, precision of 86%, and recall of 80%. Similarly, integrated fastText-based pre-trained models the RPBiLSTM yield competitive performance, with an AUC score of 95%, precision of 85%, and recall of 80%. This comprehensive and integrated approach provides a practical solution for effectively analyzing and classifying NFRs, thereby facilitating improved software development practices.
Internet of Things (IoT) is a network of physical objects or things that can communicate and share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart sensing devices share ...remote patient monitoring data towards central repositories. During medical data aggregation and transmission, security is mandatory to guard against intruders. The main problem in existing base schemes is that complex multiplication operations are used for batch key creation. These schemes are computationally expensive and require huge memory space at the aggregator node (AN). This paper presents a lightweight Secure Aggregation and Transmission Scheme (SATS) for secure and lightweight data computation and transmission. SATS provides a lightweight XOR operation for obtaining batch keys instead of the expensive multiplication operation. Furthermore, the AN Receiving Message Algorithm (ARMA) is presented at the AN to aggregate data generated by sensor nodes. The Receiving Message Extractor (RME) algorithm is presented to decrypt the message and perform batch verification at the Fog-Server. SATS protects against several security threats such as denial of service attacks, the man in the middle attack, and reply attacks. The proposed SATS is simulated by using simulation tool NS 2.35. The results show that SATS provides lightweight data transmission by reducing computation and communication costs.The computation cost of the SATS scheme is 14%, 23% and 59% at AN, and at Fog-Node 6.5%, 21.5% and 51%, and Communication cost 6%, 3%, and 4% at Sensor Node, and at AN 6%, 9%, and 12% better than PPDAS, IDAP, and ASAS respectively. The proposed SATS is compared with relevant schemes and the results show that it provides better storage capacity, computations cost, communications cost, and energy consumption.
This article works on profit maximization, in which customer satisfaction and efficient scheduling are considered to optimize the underlying resource utilization. The performance of services is one ...of the most important variables in customer satisfaction. Display omitted
•A lightweight authentication scheme for resource limited environment is presented.•The randomized key generated has the capabilities of low overhead and robust security.•We present a comparative analysis of the proposed schemes with existing schemes.
With the emergence of the Internet of Things (IoT) and the rapid advancement in sensor technology, wireless medical sensor networks (WMSNs) have become increasingly important in improving health services. WMSNs are deployed for remote monitoring and collecting physiological data of patients for diagnosis and treatment. With the assistance of wearable and mobile devices, IoT-based innovative healthcare solution is extensively adopted to provide better, more precise, and quicker diagnoses. However, the WMSN of healthcare is bandwidth limited and has low latency, while the resource-limited sensors and tremendous IoT output cannot run on practiced security protocols that involve complex encryption/decryption operations. A security system that requires minimal computation and communication time to reduce delay and save the devices’ power source is much needed. Therefore, this article presents a lightweight and robust authentication protocol for the healthcare system that can be used with power and bandwidth-limited devices. Furthermore, this scheme uses random numbers instead of complex encryption/decryption to reduce computation time and energy consumption. The security and performance analysis results show that the proposed method performs better than its competitors regarding security, communication, and computation costs and prolongs the network lifetime.
Wireless sensor networks consist of resource limited devices. Most crucial of these resources is battery life, as in most applications like battle field or volcanic area monitoring, it is often ...impossible to replace or recharge the power source. This article presents an energy efficient collaborative communication system based on spread spectrum to achieve energy efficiency as well as immunity against jamming, natural interference, noise suppression and universal frequency reuse. Performance of the proposed system is evaluated using the received signal power, bit error rate (BER) and energy consumption. The results show a direct proportionality between the power gain and the number of collaborative nodes as well as BER and signal-to-noise ratio (Eb/N0). The analytical and simulation results of the proposed system are compared with SISO system. The comparison reveals that SISO perform better than collaborative communication in case of small distances whereas collaborative communication performs better than SISO in case of long distances. On the basis of these results it is safe to conclude that collaborative communication in wireless sensor networks using wideband systems improves the life time of nodes in the networks thereby prolonging the network's life time.
The use of modern technology for the Goodwell of human beings especially in medical science is a hot research area. Telecare Medicine Information System (TMIS) is very popular in health care services ...in developed countries where a physician can remotely get patients related information. The security of such information is very critical as its misuse can have adverse effects on the patients' life. The information transmitted over a public channel is protected using authentication protocols. For this purpose, various biometrics-based authentication protocols including Omid et al.'s protocol have been proposed. However, in this article, it has been analyzed that Omid et al.'s protocol is susceptible to user impersonation attack and also fails to protect user identity. Hence, to remedy the problems an improved mechanism is needed to secure the three-factor authentication framework for the practical application. Therefore, a robust and efficient biometrics-based authentication and key agreement protocols for E-Health Services has been proposed. Further, it has been shown through formal and informal analysis that the proposed scheme is provably secure.
Web content credibility implies finding credible and correct information on the web. Recent studies have shown there is an increasing trend of users turning towards the web for searching information ...related to a variety of topics including health, stocks, education, politics to name few. Information credibility is a critical factor in these domains for the decision makers. There is no limitation on the authorship of those articles and content. One criterion for evaluating credibility is to check the authority or source of information. However, there are situations when wrong information flows from credible sources. There are various approaches towards credibility assessment, broadly categorized into human-based and computational approaches. Computational approaches utilizing machine learning based techniques are computationally expensive. Reputation based approaches overcome this, however the latest work fails to take into account issue of negative referrals and utilizes simple summation as the calculation structure making it more resilient to attacks. This paper put forth verified hypothesis of direct relationship of credibility to the expertise of entity. Authors proposed a Bayesian based approach using feedback in the form of interaction among the entities to compute their expertise level, thereby showing improved results in terms of Precision, Correlation and Mean Average Error. The experiments are performed on two different datasets, one of the dataset is developed from a survey as the part of the research study. The results from the two experiments show that the reputation ranks are independent of the pattern of ratings and density of data, unlike previous techniques whose results were limited by these factors. The proposed technique gives 27% and 18% more precise results for the two experiments respectively compared to the baseline. The correlation results are also significant in both experiments for the proposed technique with significant values of 0.39 and 0.87 showing a linear relationship between predicted and original data. The paper also discusses the reputation attacks and proposes counter measures to tackle these attacks through simulation results.
The recent advancements in cyber technology have facilitated the global electronic sharing of healthcare data among various healthcare professionals, including clinicians, researchers, business ...administrators, and others. Fog computing is gaining popularity as a means of disseminating information across industries, especially in medicine and healthcare, due to its capability to manage vast amounts of information and data. The evolution of fog computing now allows it to be adaptable to various budget constraints within healthcare organizations, thanks to technological progress. This adaptation includes features like real-time data breach alerts and automated surveillance. As new communication and computing models emerge, fresh security and privacy concerns arise within medical and health-related data. Existing data privacy and security protocols have proven inadequate in preventing data leaks and theft attacks, especially those orchestrated by malicious parties. While medical data is stored in the cloud, legitimate entities' authorized access to medical documents remains a significant concern. Therefore, this article designs an authentication and authorization scheme that safeguards the privacy of users' medical information documents. In response to this challenge, we propose an innovative approach that leverages Decoy information technology and User Behavior profiling. This methodology aims to enhance the security of authorized data access within the Fog environment, ensuring the confidentiality of medical data. The results show that the proposed protocol is more secure against unauthorized access and security attacks and more computationally efficient than its counterparts.
In the last decades machining methods have witnessed an advancement in both cutting tools' geometry and hard coatings, sometimes in combination with Ti-based coating. In the present study, the ...machining performance of adhesion resistant Ti-based coating materials with modified cutting insert on tool wear was investigated in turning AISI 1017 carbon steel. TiB2 and TiN hard coatings with similar layer thickness produced by physical vapor deposition (PVD) technique were considered as coating film for 1 mm thick tungsten carbide with Co binder cutting tools. The machining performance was evaluated mainly by surface roughness, cutting temperature and correlated in terms of tool wear. Through a set of experiments, modified cutting insert coated with TiB2 exhibited about 24-33% improvement in tool wear compared to TiN coated insert. The results from this study show that TiB2 coating can be used as coating material for cutting tool but further research on tribology and sustainability along with cutting dynamics study are prerequisites for commercial application of this coating material in the mainstream.
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, ...sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in ...wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.