2023
Authors
Javadpour, A; Sangaiah, AK; Jafari, F; Pinto, P; Memarzadeh-Tehran, H; Rezaei, S; Saghafi, F;
Publication
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Abstract
Monitoring security and quality of service is essential, due to the rapid growth of the number of nodes in wireless networks. In healthcare/industrial environments, especially in wireless body area networks (WBANs), this is even more important. Because the delays and errors can directly affect patients'/scientists' health. To increase the Monitoring Quality of Services (MQoS) in WBANs, a secure medium access control (MAC) protocol needs to be developed to provide optimal services. This article provides a comprehensive review of MAC protocols in WBANs with a technical security analysis approach. Time-based, contention-based, and hybrid protocols are compared in this article, regarding MQoS and their security vulnerabilities. We have considered delay, packet loss, and energy consumption as performance evaluation criteria in WBANs, which may be degraded under a cyberattack. This work shows that there is a research gap in the literature, which is the failure of covering security and privacy issues in the MAC layer protocols.
2023
Authors
Fontes, T; Murcos, F; Carneiro, E; Ribeiro, J; Rossetti, RJF;
Publication
IEEE OPEN JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS
Abstract
This work presents a deep learning framework for analyzing urban mobility by extracting knowledge from messages collected from Twitter. The framework, which is designed to handle large-scale data and adapt automatically to new contexts, comprises three main modules: data collection and system configuration, data analytics, and aggregation and visualization. The text data is pre-processed using NLP techniques to remove informal words, slang, and misspellings. A pre-trained, unsupervised word embedding model, BERT, is used to classify travel-related tweets using a unigram approach with three dictionaries of travel-related target words: small, medium, and big. Public opinion is evaluated using VADER to classify travel-related tweets according to their sentiments. The mobility of three major cities was assessed: London, Melbourne, and New York. The framework demonstrates consistently high average performance, with a Precision of 0.80 for text classification and 0.77 for sentiment analysis. The framework can aggregate sparse information from social media and provide updated information in near real-time with high spatial resolution, enabling easy identification of traffic-related events. The framework is helpful for transportation decision-makers in operational control, tactical-strategic planning, and policy evaluation. For example, it can be used to improve the management of resources during traffic congestion or emergencies.
2023
Authors
Graca, PA; Alves, JC; Ferreira, BM;
Publication
SENSORS
Abstract
Accurate localization is a critical task in underwater navigation. Typical localization methods use a set of acoustic sensors and beacons to estimate relative position, whose geometric configuration has a significant impact on the localization accuracy. Although there is much effort in the literature to define optimal 2D or 3D sensor placement, the optimal sensor placement in irregular and constrained 3D surfaces, such as autonomous underwater vehicles (AUVs) or other structures, is not exploited for improving localization. Additionally, most applications using AUVs employ commercial acoustic modems or compact arrays, therefore the optimization of the placement of spatially independent sensors is not a considered issue. This article tackles acoustic sensor placement optimization in irregular and constrained 3D surfaces, for inverted ultra-short baseline (USBL) approaches, to improve localization accuracy. The implemented multi-objective memetic algorithm combines an evaluation of the geometric sensor's configuration, using the Cramer-Rao Lower Bound (CRLB), with the incidence angle of the received signal. A case study is presented over a simulated homing and docking scenario to demonstrate the proposed optimization algorithm.
2023
Authors
Javadpour, A; Pinto, P; Ja'fari, F; Zhang, WZ;
Publication
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
Abstract
Cloud Internet of Things (CIoT) environments, as the essential basis for computing services, have been subject to abuses and cyber threats. The adversaries constantly search for vulnerable areas in such computing environments to impose their damages and create complex challenges. Hence, using intrusion detection and prevention systems (IDPSs) is almost mandatory for securing CIoT environments. However, the existing IDPSs in this area suffer from some limitations, such as incapability of detecting unknown attacks and being vulnerable to the single point of failure. In this paper, we propose a novel distributed multi-agent IDPS (DMAIDPS) that overcomes these limitations. The learning agents in DMAIDPS perform a six-step detection process to classify the network behavior as normal or under attack. We have tested the proposed DMAIDPS with the KDD Cup 99 and NSL-KDD datasets. The experimental results have been compared with other methods in the field based on Recall, Accuracy, and F-Score metrics. The proposed system has improved the Recall, Accuracy, and F-Scores metrics by an average of 16.81%, 16.05%, and 18.12%, respectively.
2023
Authors
Senna, PP; Roca, JB; Barros, AC;
Publication
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE
Abstract
The digital transformation of manufacturing activities is expected to bring large societal benefits in terms of productivity and sustainability. However, uptake of digital technologies is slower than desirable. As a result, governments are taking action to try to overcome some of the barriers to adoption. However, the mechanisms through which government may act are quite diverse. In this paper, we compare the national strategies across the 27 countries members of the European Union. We map each country's initiative to 14 barriers to the adoption of digital technologies in manufacturing observed in the literature. We observe that most institutional efforts focus on providing funding, developing new regulatory frameworks related to data privacy and security, and creating human capital. Some known barriers to adoption observed at the firm level, such as the lack of off-the-shelf solutions, or the need for retrofitting old equipment, are largely overlooked. We do not find any relationship between the number of initiatives proposed by each country, and the country's existing level of digitalization. We conclude by proposing several policy recommendations, as well as directions for future research.
2023
Authors
Mendes, TC; Barata, AA; Pereira, M; Moreira, JM; Camacho, R; Sousa, RT;
Publication
Intelligent Data Engineering and Automated Learning - IDEAL 2023 - 24th International Conference, Évora, Portugal, November 22-24, 2023, Proceedings
Abstract
Keeping high service levels of a fast-growing number of servers is crucial and challenging for IT operations teams. Online monitoring systems trigger many occurrences that experts find hard to keep up with. In addition, most of the triggered warnings do not correspond to real, critical problems, making it difficult for technicians to know which to focus on and address in a timely manner. Outlier and concept drift detection techniques can be applied to multiple streams of readings related to server monitoring metrics, but they also generate many False Positives. Ranking algorithms can already prioritize relevant results in information retrieval and recommender systems. However, these approaches are supervised, making them inapplicable in event detection on data streams. We propose a framework that combines event aggregations and uses a customized clustering algorithm to score and rank alarms in the context of IT operations. To the best of our knowledge, this is the first unsupervised, online, high-dimensional approach to rank IT ops events and contributes to advancing knowledge about associated key concepts and challenges of this problem. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.