• Title/Summary/Keyword: multi issues

Search Result 884, Processing Time 0.025 seconds

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

A Survey on the Mobile Crowdsensing System life cycle: Task Allocation, Data Collection, and Data Aggregation

  • Xia Zhuoyue;Azween Abdullah;S.H. Kok
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.31-48
    • /
    • 2023
  • The popularization of smart devices and subsequent optimization of their sensing capacity has resulted in a novel mobile crowdsensing (MCS) pattern, which employs smart devices as sensing nodes by recruiting users to develop a sensing network for multiple-task performance. This technique has garnered much scholarly interest in terms of sensing range, cost, and integration. The MCS is prevalent in various fields, including environmental monitoring, noise monitoring, and road monitoring. A complete MCS life cycle entails task allocation, data collection, and data aggregation. Regardless, specific drawbacks remain unresolved in this study despite extensive research on this life cycle. This article mainly summarizes single-task, multi-task allocation, and space-time multi-task allocation at the task allocation stage. Meanwhile, the quality, safety, and efficiency of data collection are discussed at the data collection stage. Edge computing, which provides a novel development idea to derive data from the MCS system, is also highlighted. Furthermore, data aggregation security and quality are summarized at the data aggregation stage. The novel development of multi-modal data aggregation is also outlined following the diversity of data obtained from MCS. Overall, this article summarizes the three aspects of the MCS life cycle, analyzes the issues underlying this study, and offers developmental directions for future scholars' reference.

Protection and restoration path calculation method in T-SDN (Transport SDN) based on multiple ring-mesh topology (다중링-메시 토폴로지 기반 T-SDN(Transport SDN)에서 보호·복구 경로 계산 방식)

  • Hyuncheol Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.3-8
    • /
    • 2023
  • Multi-domain optical transport networks are not fundamentally interoperable and require an integrated orchestration mechanism and path provision mechanism at the entire network level. In addition, ensuring network survivability is one of the important issues. MPLS-TP (Multi-Protocol Label Switching-Transport Profile) defines various protection/recovery methods as standards, but does not mention how to calculate and select protection/recovery paths. Therefore, an algorithm that minimizes protection/recovery collisions at the optical circuit packet integrated network level and calculates and sets a path that can be rapidly protected/recovered over the entire integrated network area is required. In this paper, we proposed an algorithm that calculates and sets up a path that can be rapidly protected and restored in a T-SDN network composed of multiple ring-mesh topology.

Comparison of Loss Function for Multi-Class Classification of Collision Events in Imbalanced Black-Box Video Data (불균형 블랙박스 동영상 데이터에서 충돌 상황의 다중 분류를 위한 손실 함수 비교)

  • Euisang Lee;Seokmin Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.49-54
    • /
    • 2024
  • Data imbalance is a common issue encountered in classification problems, stemming from a significant disparity in the number of samples between classes within the dataset. Such data imbalance typically leads to problems in classification models, including overfitting, underfitting, and misinterpretation of performance metrics. Methods to address this issue include resampling, augmentation, regularization techniques, and adjustment of loss functions. In this paper, we focus on loss function adjustment, particularly comparing the performance of various configurations of loss functions (Cross Entropy, Balanced Cross Entropy, two settings of Focal Loss: 𝛼 = 1 and 𝛼 = Balanced, Asymmetric Loss) on Multi-Class black-box video data with imbalance issues. The comparison is conducted using the I3D, and R3D_18 models.

Time-Series Forecasting Based on Multi-Layer Attention Architecture

  • Na Wang;Xianglian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • Time-series forecasting is extensively used in the actual world. Recent research has shown that Transformers with a self-attention mechanism at their core exhibit better performance when dealing with such problems. However, most of the existing Transformer models used for time series prediction use the traditional encoder-decoder architecture, which is complex and leads to low model processing efficiency, thus limiting the ability to mine deep time dependencies by increasing model depth. Secondly, the secondary computational complexity of the self-attention mechanism also increases computational overhead and reduces processing efficiency. To address these issues, the paper designs an efficient multi-layer attention-based time-series forecasting model. This model has the following characteristics: (i) It abandons the traditional encoder-decoder based Transformer architecture and constructs a time series prediction model based on multi-layer attention mechanism, improving the model's ability to mine deep time dependencies. (ii) A cross attention module based on cross attention mechanism was designed to enhance information exchange between historical and predictive sequences. (iii) Applying a recently proposed sparse attention mechanism to our model reduces computational overhead and improves processing efficiency. Experiments on multiple datasets have shown that our model can significantly increase the performance of current advanced Transformer methods in time series forecasting, including LogTrans, Reformer, and Informer.

Comprehensive Survey on Multi Attribute Decision Making Methods for Wireless Ad Hoc Networks

  • Beom-Su Kim;Ki-Il Kim;GyuRi Chang;Kyong Hoon Kim;BongSoo Roh;Jae-Hyun Ham
    • Journal of Internet Technology
    • /
    • v.20 no.5
    • /
    • pp.1575-1588
    • /
    • 2019
  • Recently, to design dynamic networks without existing infrastructure, wireless ad hoc networks have been proposed to establish self-organizing networks. In this type of network, to resolve the primary research challenge of establishing a stable path between source and destination, several metrics or utility values have been proposed to meet the specific objectives, as well as improve packet delivery ratio when developing communication protocols or addressing technical issues. Notably, most existing studies use the Multi Attribute Decision Making (MADM) algorithm to balance weights between relevant metrics to realize the above objective. However, despite their significant efforts, a comprehensive survey paper analyzing them together has not been published. Thus, in this paper, we describe the recent research and development efforts to employ MADM in ad hoc networks. First, we provide an overview of MADM and explain the well-known algorithms. After categorizing the current work according to the algorithms, the existing schemes are further divided by the type of networks. Based on this classification, we then detail the procedures with their research objectives. Furthermore, we present other research challenges and apparent problems in this research area.

Multi-objective permutation flow shop scheduling in precast production under consideration of embodied carbon emissions

  • Zhongfu LI;Ruiyan ZHENG
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.25-32
    • /
    • 2024
  • Conventional construction methods face significant challenges in reducing carbon emissions and promoting environmental sustainability. Off-Site Construction (OSC) method is widely recognized as a low-carbon, high-efficiency alternative construction method. However, in practice, it often fails to deliver the expected benefits, leading to issues such as excessive carbon emissions, unpunctual delivery, and cost overruns in OSC projects. In order to ensure the carbon benefits of OSC and further its development,this study conducts an in-depth analysis of embodied carbon emissions in the precast production process, proposes a multi-objective optimization model based on the permutation flow shop scheduling problem, and designs an automated solution algorithm using NSGA-II to derive Pareto optimal schedules. Through the analysis of real-world case data, the proposed approach, compared to conventional scheduling methods, is estimated to reduce embodied carbon emissions by approximately 6 % while simultaneously cutting tardiness/earliness penalty by 75%. This study offers a model for precast production scheduling, effectively enhancing production efficiency and reducing carbon emissions, enabling construction component enterprises to engage in low-carbon, cost-effective, and efficient production, thereby fostering sustainable development in the construction industry.

A Study on the Multi-dimensional Greening Preferential Factors for Securing Green Spaces in Cities (도시 녹지 공간 확보를 위한 건물의 입체녹화 선호요인에 관한 연구)

  • CHOI, Jae-Hyun;LEE, Myeong-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.521-530
    • /
    • 2019
  • With a view to respond to urban climate change issues and improve the urban environment in a qualitative manner, the strategy of multi-dimensional greening of the traditional markets in the City of Seoul to secure the multi-dimensional green spaces can result in a significant effect in terms of landscaping, environment, and spatial aspect. The purpose of this study is to examine the elements of multi-dimensional greening for the multi-dimensional greening of buildings in order to enhance the greening function within urban phenomena and, with this, establish the criteria for success introduction of multi-dimensional greening and its qualitative expansion. For this, a total of 569 consumers of traditional markets have been interviewed, and the data from their questionnaires were analyzed through SPSS and AMOS software. The result of the analysis showed that the elements of the multi-dimensional greening of traditional markets, such as the economical, physical, functional, visual, and facility aspects all affected the consumer expectation in a positive manner. Also, depending on the gender of the customers of traditional markets, the ecological aspect among the elements of multi-dimensional greening had a significant difference. And, by the age, the functional, physical, and visual aspects of the elements of multi-dimensional greening showed a significant different. And, the expectation on the multidimensional greening of traditional markets also showed a statistically significant difference. By the level of education, there were significant differences in terms of the physical and visual aspects of the multi-dimensional greening elements. And, the level of expectation on the multidimensional greening also differed significantly.

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

Empirical Analysis Approach to Investigating how Consumer's Continuance Intention to Use Online Store is Influenced by Uncertainty, Switching Cost, Offline Trust, and Individual Negative Emotion: Emphasis on Offline-Online Multi-Channels (오프라인-온라인 멀티채널 상황에서 불확실성, 전환비용, 오프라인 신뢰 및 개인의 부정감정이 사용자 지속구매의도에 미치는 영향에 관한 실증연구)

  • Jeon, Hyeon Gyu;Lee, Kun Chang
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.428-439
    • /
    • 2016
  • It becomes undeniable trends that offline shopping stores operate their own online shopping stores too. The multi-channel shopping stores like this allow consumers to have much choices to shop from either offline channel or online channel. This trend, however, also opens new research issues. Especially, we have found from literature survey that a new research model is necessary for more in-depth study of the consumer behavior analysis in the multi-channel trends like this, where those constructs such as offline trust, uncertainty, switching cost, and individual negative emotion are considered. It is noted, especially in the multi-channel environments, that uncertainty and switching cost need to be considered, and that individual tends to feel negative emotion much more. By relying on 406 valid questionnaires, we obtained empirical results such that switching cost and offline trust have a positive effect on continuance intention, and uncertainty tends to increase switching cost. Individual negative emotion also affects continuance intention significantly.