期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A Holistic,Proactive and Novel Approach for Pre,During and Post Migration Validation from Subversion to Git
1
作者 Vinay Singh mohammed alshehri +3 位作者 Alok Aggarwal Osama Alfarraj Purushottam Sharma K.R.Pardasani 《Computers, Materials & Continua》 SCIE EI 2021年第3期2359-2371,共13页
Software development is getting a transition from centralized version control systems(CVCSs)like Subversion to decentralized version control systems(DVCDs)like Git due to lesser efficiency of former in terms of branch... Software development is getting a transition from centralized version control systems(CVCSs)like Subversion to decentralized version control systems(DVCDs)like Git due to lesser efficiency of former in terms of branching,fusion,time,space,merging,offline commits&builds and repository,etc.Git is having a share of 77%of total VCS,followed by Subversion with a share of 13.5%.The majority of software industries are getting a migration from Subversion to Git.Only a few migration tools are available in the software industry.Still,these too lack in many features like lack of identifying the empty directories as premigration check,failover capabilities during migration due to network failure or disk space issue,and detailed report generation as post-migration steps.In this work,a holistic,proactive and novel approach has been presented for pre/during/post-migration validation from Subversion to Git.Many scripts have been developed and executed run-time over various projects for overcoming the limitations of existing migration software tools for a Subversion to Git migration.During premigration,none of the available migration tools has the capability to fetch empty directories of Subversion,which results in an incomplete migration from Subversion to Git.Many Scripts have been developed and executed for pre-migration validation and migration preparation,which overcomes the problem of incomplete migration.Experimentation was conducted in SRLC Software Research Lab,Chicago,USA.During the migration process,in case of loss of network connection or due to any other reason,if migration stops or breaks,available migration tools do not have capabilities to start over from the same point where it left.Various Scripts have been developed and executed to keep the migration revision history in the cache(elastic cache)to start from the same point where it was left due to connection failure.During post-migration,none of the available version control migration tools generate a detailed report giving information about the total size of source Subversion repositories, the total volume of data migrated todestination repositories in Git, total number of pools migrated, time taken formigration, number of Subversion users with email notification, etc. VariousScripts have been developed and executed for the above purpose during thepost-migration process. 展开更多
关键词 Databases and information systems SUBVERSION Git version control system TRUNK tag translational settings author mapping
下载PDF
Dm-Health App:Diabetes Diagnosis Using Machine Learning with Smartphone
2
作者 Elias Hossain mohammed alshehri +6 位作者 Sultan Almakdi Hanan Halawani Md.Mizanur Rahman Wahidur Rahman Sabila Al Jannat Nadim Kaysar Shishir Mia 《Computers, Materials & Continua》 SCIE EI 2022年第7期1713-1746,共34页
Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate diabetes.This research aimed to develop an intelligent mobile application based on machine learning to determine ... Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate diabetes.This research aimed to develop an intelligent mobile application based on machine learning to determine the diabetic,pre-diabetic,or non-diabetic without the assistance of any physician or medical tests.This study’s methodology was classified into two the Diabetes Prediction Approach and the Proposed System Architecture Design.The Diabetes Prediction Approach uses a novel approach,Light Gradient Boosting Machine(LightGBM),to ensure a faster diagnosis.The Proposed System ArchitectureDesign has been combined into sevenmodules;the Answering Question Module is a natural language processing Chabot that can answer all kinds of questions related to diabetes.The Doctor Consultation Module ensures free treatment related to diabetes.In this research,90%accuracy was obtained by performing K-fold cross-validation on top of the K nearest neighbor’s algorithm(KNN)&LightGBM.To evaluate the model’s performance,Receiver Operating Characteristics(ROC)Curve and Area under the ROC Curve(AUC)were applied with a value of 0.948 and 0.936,respectively.This manuscript presents some exploratory data analysis,including a correlation matrix and survey report.Moreover,the proposed solution can be adjustable in the daily activities of a diabetic patient. 展开更多
关键词 Machine learning diabetes-prediction support vector machine(SVM) LightGBM EHEALTH ROC-AUC
下载PDF
Real-time Privacy Preserving Framework for Covid-19 Contact Tracing
3
作者 Akashdeep Bhardwaj Ahmed A.Mohamed +2 位作者 Manoj Kumar mohammed alshehri Ahed Abugabah 《Computers, Materials & Continua》 SCIE EI 2022年第1期1017-1032,共16页
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple countries.Countries have shut their borders,and their nationals have been advise... The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple countries.Countries have shut their borders,and their nationals have been advised to self-quarantine.The variety of responses to the pandemic has given rise to data privacy concerns.Infection prevention and control strategies as well as disease control measures,especially real-time contact tracing for COVID-19,require the identification of people exposed to COVID-19.Such tracing frameworks use mobile apps and geolocations to trace individuals.However,while the motive may be well intended,the limitations and security issues associated with using such a technology are a serious cause of concern.There are growing concerns regarding the privacy of an individual’s location and personal identifiable information(PII)being shared with governments and/or health agencies.This study presents a real-time,trust-based contact-tracing framework that operateswithout the use of an individual’sPII,location sensing,or gathering GPS logs.The focus of the proposed contact tracing framework is to ensure real-time privacy using the Bluetooth range of individuals to determine others within the range.The research validates the trust-based framework using Bluetooth as practical and privacy-aware.Using our proposed methodology,personal information,health logs,and location data will be secure and not abused.This research analyzes 100,000 tracing dataset records from 150 mobile devices to identify infected users and active users. 展开更多
关键词 PRIVACY contact tracing mobile apps BLUETOOTH Covid EPIDEMIC
下载PDF
Blockchain-Based SQKD and IDS in Edge Enabled Smart Grid Network
4
作者 Abdullah Musaed Alkhiari Shailendra Mishra mohammed alshehri 《Computers, Materials & Continua》 SCIE EI 2022年第2期2149-2169,共21页
Smart Grid is a power grid that improves flexibility,reliability,and efficiency through smart meters.Due to extensive data exchange over the Internet,the smart grid faces many security challenges that have led to data... Smart Grid is a power grid that improves flexibility,reliability,and efficiency through smart meters.Due to extensive data exchange over the Internet,the smart grid faces many security challenges that have led to data loss,data compromise,and high power consumption.Moreover,the lack of hardware protection and physical attacks reduce the overall performance of the smart grid network.We proposed the BLIDSE model(Blockchain-based secure quantum key distribution and Intrusion Detection System in Edge Enables Smart Grid Network)to address these issues.The proposed model includes five phases:The first phase is blockchain-based secure user authentication,where all smart meters are first registered in the blockchain,and then the blockchain generates a secret key.The blockchain verifies the user ID and the secret key during authentication matches the one authorized to access the network.The secret key is shared during transmission through secure quantum key distribution(SQKD).The second phase is the lightweight data encryption,for which we use a lightweight symmetric encryption algorithm,named Camellia.The third phase is the multi-constraint-based edge selection;the data are transmitted to the control center through the edge server,which is also authenticated by blockchain to enhance the security during the data transmission.We proposed a perfect matching algorithm for selecting the optimal edge.The fourth phase is a dual intrusion detection system which acts as a firewall used to drop irrelevant packets,and data packets are classified into normal,physical errors and attacks,which is done by Double DeepQNetwork(DDQN).The last phase is optimal user privacy management.In this phase,smartmeter updates and revocations are done,forwhichwe proposed Forensic based Investigation Optimization(FBI),which improves the security of the smart grid network.The simulation is performed using network simulator NS3.26,which evaluates the performance in terms of computational complexity,accuracy,false detection,and false alarm rate.The proposed BLIDSE model effectively mitigates cyber-attacks,thereby contributing to improved security in the network. 展开更多
关键词 Smart grid edge computing intrusion detection system blockchain quantum key distribution deep reinforcement learning
下载PDF
Forecasting Mental Stress Using Machine Learning Algorithms
5
作者 Elias Hossain Abdulwahab Alazeb +4 位作者 Naif Almudawi Sultan Almakdi mohammed alshehri M.Gazi Golam Faruque Wahidur Rahman 《Computers, Materials & Continua》 SCIE EI 2022年第9期4945-4966,共22页
Depression is a crippling affliction and affects millions of individuals around the world.In general,the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration wi... Depression is a crippling affliction and affects millions of individuals around the world.In general,the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration with psychologists and other mental health experts,which results in lower costs and improved patient outcomes.However,this strategy can necessitate a lot of buy-in from a large number of people,as well as additional training and logistical considerations.Thus,utilizing the machine learning algorithms,patients with depression based on information generally present in a medical file were analyzed and predicted.The methodology of this proposed study is divided into six parts:Proposed Research Architecture(PRA),Data Pre-processing Approach(DPA),Research Hypothesis Testing(RHT),Concentrated Algorithm Pipeline(CAP),Loss Optimization Stratagem(LOS),and Model Deployment Architecture(MDA).The Null Hypothesis and Alternative Hypothesis are applied to test the RHT.In addition,Ensemble Learning Approach(ELA)and Frequent Model Retraining(FMR)have been utilized for optimizing the loss function.Besides,the Features Importance Interpretation is also delineated in this research.These forecasts could help individuals connect with expert mental health specialists more quickly and easily.According to the findings,71%of people with depression and 80%of those who do not have depression can be appropriately diagnosed.This study obtained 91%and 92%accuracy through the Random Forest(RF)and Extra Tree Classifier.But after applying the Receiver operating characteristic(ROC)curve,79%accuracy was found on top of RF,81%found on Extra Tree,and 82%recorded for the eXtreme Gradient Boosting(XGBoost)algorithm.Besides,several factors are identified in terms of predicting depression through statistical data analysis.Though the additional effort is needed to develop a more accurate model,this model can be adjustable in the healthcare sector for diagnosing depression. 展开更多
关键词 Depression analysis mental health machine learning model deployment XGBoost ROC-AUC
下载PDF
Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm
6
作者 mohammed alshehri Purushottam Sharma +1 位作者 Richa Sharma Osama Alfarraj 《Computers, Materials & Continua》 SCIE EI 2021年第3期2525-2538,共14页
Sensors and physical activity evaluation are quite limited for motionbased commercial devices.Sometimes the accelerometer of the smartwatch is utilized;walking is investigated.The combination can perform better in ter... Sensors and physical activity evaluation are quite limited for motionbased commercial devices.Sometimes the accelerometer of the smartwatch is utilized;walking is investigated.The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones,i.e.,accelerometer and gyroscope.For biometric efficiency,some of the diverse activities of daily routine have been evaluated,also with biometric authentication.The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities.This indicates that the high feasibility and results of continuous biometrics analysis in terms of average daily routine activities.In this research,the set of rules with the real-valued attributes are evolved with the use of a genetic algorithm.With the help of real value genes,the real value attributes cab be encoded,and presentation of new methods which are represents not to cares in the rules.The rule sets which help in maximizing the number of accurate classifications of inputs and supervise classifications are viewed as an optimization problem.The use of Pitt approach to the ML(Machine Learning)and Genetic based system that includes a resolution mechanism among rules that are competing within the same rule sets is utilized.This enhances the efficiency of the overall system,as shown in the research. 展开更多
关键词 Genetic algorithms BIOMETRICS data mining SENSORS SMARTPHONE smartwatch
下载PDF
Self-Management of Low Back Pain Using Neural Network
7
作者 Purushottam Sharma mohammed alshehri +1 位作者 Richa Sharma Osama Alfarraj 《Computers, Materials & Continua》 SCIE EI 2021年第1期885-901,共17页
Low back pain(LBP)is a morbid condition that has afflicted several citizens in Europe.It has negatively impacted the European economy due to several man-days lost,with bed rest and forced inactivity being the usual LB... Low back pain(LBP)is a morbid condition that has afflicted several citizens in Europe.It has negatively impacted the European economy due to several man-days lost,with bed rest and forced inactivity being the usual LBP care and management steps.Direct models,which incorporate various regression analyses,have been executed for the investigation of this premise due to the simplicity of translation.However,such straight models fail to completely consider the impact of association brought about by a mix of nonlinear connections and autonomous factors.In this paper,we discuss a system that aids decision-making regarding the best-suited support system for LBP,allowing the individual to avail of reinforcement and improvement in its self-management.These activities are monitored with the help of a wearable sensor that helps in their detection and their classification as those that soothe or aggravate LBP and hence,should or should not be performed.This system helps the patients set their own boundaries and milestones with respect to suitable activities.This system also does windowing and feature extraction.The present study is an empirical and comparative analysis of the most suitable activities that patients suffering from low back pain can select.The evaluation shows that the system can distinguish between nine common daily activities effectively and helps self-monitor these activities for the efficient management of LBP. 展开更多
关键词 Low back pain neural networks SENSOR CLASSIFICATION time series
下载PDF
Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform
8
作者 mohammed alshehri 《Computers, Materials & Continua》 SCIE EI 2021年第4期917-931,共15页
Cyber Threat Intelligence(CTI)has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks.Th... Cyber Threat Intelligence(CTI)has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks.The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution.While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations,there exists a great challenge ineffective processing of large count of different Indicators of Threat(IoT)which appear regularly,and that can be solved only through a collaborative approach.Collaborative approach and intelligence sharing have become the mandatory element in the entire world of processing the threats.In order to covet the complete needs of having a definite standard of information exchange,various initiatives have been taken in means of threat information sharing platforms like MISP and formats such as SITX.This paper proposes a scoring model to address information decay,which is shared within TISP.The scoring model is implemented,taking the use case of detecting the Threat Indicators in a phishing data network.The proposed method calculates the rate of decay of an attribute through which the early entries are removed. 展开更多
关键词 Information interchange cyber threat intelligence indicators of threats threat intelligence sharing platform
下载PDF
Impact of Human Vulnerabilities on Cybersecurity
9
作者 Maher Alsharif Shailendra Mishra mohammed alshehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1153-1166,共14页
Today,security is a major challenge linked with computer network companies that cannot defend against cyber-attacks.Numerous vulnerable factors increase security risks and cyber-attacks,including viruses,the internet,... Today,security is a major challenge linked with computer network companies that cannot defend against cyber-attacks.Numerous vulnerable factors increase security risks and cyber-attacks,including viruses,the internet,communications,and hackers.Internets of Things(IoT)devices are more effective,and the number of devices connected to the internet is constantly increasing,and governments and businesses are also using these technologies to perform business activities effectively.However,the increasing uses of technologies also increase risks,such as password attacks,social engineering,and phishing attacks.Humans play a major role in the field of cybersecurity.It is observed that more than 39%of security risks are related to the human factor,and 95%of successful cyber-attacks are caused by human error,with most of them being insider threats.The major human factor issue in cybersecurity is a lack of user awareness of cyber threats.This study focuses on the human factor by surveying the vulnerabilities and reducing the risk by focusing on human nature and reacting to different situations.This study highlighted that most of the participants are not experienced with cybersecurity threats and how to protect their personal information.Moreover,the lack of awareness of the top three vulnerabilities related to the human factor in cybersecurity,such as phishing attacks,passwords,attacks,and social engineering,are major problems that need to be addressed and reduced through proper awareness and training. 展开更多
关键词 CYBERSECURITY phishing attack password attack social engineering cybersecurity awareness security risk
下载PDF
Web Security:Emerging Threats and Defense
10
作者 Abdulwahed Awad Almutairi Shailendra Mishra mohammed alshehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1233-1248,共16页
Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functiona... Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners. 展开更多
关键词 SQL injection attack cross-site scripting attack command injection attack path traversal attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部