ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Cybersecurity and Information Management

ISSN
Online: 2690-6775 Print: 2769-7851
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Journal of Cybersecurity and Information Management

Volume 1 / Issue 2 ( 8 Articles)

Full Length Article DOI: https://doi.org/10.54216/JISIoT.010205

Intelligent Waste Management System for Recycling and Resource Optimization

This paper proposes a deep learning-based intelligent waste management system that can accurately classify waste types and optimize waste disposal processes. The proposed system utilizes a convolutional model to concisely identify the waste type from images captured by a camera system. Our system uses intelligent data augmentation to perform large datasets of waste item images and achieves a high classification accuracy rate. The waste types are classified into several categories, including glass, cardboard, metal, plastic, paper, and trash. Experimental results show that our system achieves high accuracy rates in waste classification and improves waste disposal efficiency compared to traditional waste management systems. Our system has the potential to significantly reduce the negative impact of waste on the environment and to promote sustainable waste management practices.
Ahmed Sleem, Ibrahim Elhenawy
visibility 59016
download 6171
Full Length Article DOI: https://doi.org/10.54216/JISIoT.010204

An intelligent Multi-criteria Decision-making Model for Sustainable Higher Education Strategy Selection

This study provides a means for institutions and administrations to develop plans while taking into consideration the strategic linkages. Making strategic decisions on their programming may benefit institutions and governments when relevant material is examined and talks with higher education specialists are held (HE). To handle disagreement and different criteria, multi-criteria decision-making (MCDM) models are utilized. The most effective solution was evaluated using the new multi-criteria technique known as MABAC (Multi-Attributive Border Approximation area Comparison). Following the computation of the criterion weights, the MABAC is used to rank the options. The recommended approach may be used by institutions as well as central planners (usually the government) in higher education policy.
N. Metawa, Luka Bowanga
visibility 58821
download 4314
Full Length Article DOI: https://doi.org/10.54216/JISIoT.010203

Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption Technique for Wireless Sensor Networks

Wireless sensor network (WSN) comprises a set of sensor nodes, mainly used for data collection and tracking process. The imaging sensors in WSN captures the images from the target environment, which needs to be securely transmitted to the base station (BS). Since data transmission in WSN takes place through wireless links, security is a major challenging issue involved in the design of WSN. Image encryption is a commonly available solution to securely transmit the images to destination without comprising security. Therefore, this study designs a novel Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption (CBO-OMKIE) technique for WSN. The goal of the CBO-OMKIE technique is to securely encrypt the images in WSN. The proposed CBO-OMKIE technique involves the design of multi-key based image encryption technique to accomplish security in WSN. In addition, the CBO algorithm is applied to determine the optimal keys involved in the encryption process and it helps for improving the security level to a maximum extent. The performance validation of the CBO-OMKIE technique takes place using benchmark test images and the outcomes were examined under several aspects. The simulation outcome pointed out the enhanced security analysis of the CBO-OMKIE technique over the other techniques.
Disheng Zheng, Kai Liang
visibility 60263
download 4043
Full Length Article DOI: https://doi.org/10.54216/JCIM.010203

A Novel Fuzzy Bat Based Ambulance Detection and Traffic Counting Approach

In the recent years the importance of automatic traffic control has increased due to the traffic jams problem especially in big cities for signal control and efficient traffic management. The input video is processed and analyzed to detect an ambulance vehicle. This article introduces a robust approach for ambulance detection and traffic counting approach using novel fuzzy Bat swarm optimization and different image processing techniques. The fuzzy Bat based optimization algorithm is used to generate a template of ambulance from the abstracted frames obtained from predefined ambulance samples. This is done by using a collection of Gabor filters that have been particularly customized for the ambulance detection problem in which filter selection is achieved to group filters that have similar characteristics. The fitness criterion based on Support Vector Machine (SVM) is used to evaluate the output filters. The proposed approach is composed of the following five fundamental building phases: Fuzzy Bat based optimization, image acquisition, object detection, counting the connected objects, and finally ambulance detection.  One of the main advantages of the proposed approach is that key Gabor filters is obtained from the selected features (filters with highest membership values) which have a vital role in the ambulance detection phase. Experimental results show that the overall accuracy confirms that the performance of the proposed approach is high.  
Hossam M. Moftah, Taha M. Mohamed
visibility 60193
download 5200
Full Length Article DOI: https://doi.org/10.54216/JCIM.010201

Remote Laboratory System for Automatic Engineering

The training of specialists in automation in Cuba is carried out through the career of Automation Engineering that has within its fundamental disciplines, the Control Systems discipline. For the development of laboratory practices, students work on physical or remote devices, in person or remotely, in the latter using Remote Laboratory Systems. The present investigation proposes a Remote Laboratory System for the practice of control of the Automatic Engineering career. A scale thermal process model is designed for experimentation. The main result was the availability of practices for system identification, controller design and controller execution in real processes. In addition, the implemented solution allows students to carry out studies of the behavior of the temperature variable, the controller's response in the designed process, the establishment times, among other variables.
Omar Mar Cornelio, Jorge Gulín González, Ivan Santana Ching et al.
visibility 64212
download 5869
Full Length Article DOI: https://doi.org/10.54216/JISIoT.010202

Handling within-word and cross-word pronunciation variation for Arabic speech recognition (knowledge-based approach)

Arabic is one of the phonetically complex languages, and the creation of accurate speech recognition system is a challengeable task. Phonetic dictionary is essential component in automatic speech recognition system (ASR). The pronunciation variations in Arabic are tangible and are investigated widely using data driven approach or knowledge based approach. The phonological rules are used to get the pronunciation of each word accurately to reduce the mismatch between the actual phoneme representation of the spoken words and ASR dictionary. Several studies in Arabic ASR system are conducted using different number of phonological rules. In this paper we focus on those rule that handle within-word pronunciation variation and cross-word pronunciation variation. The experimental results indicate that handling within-word pronunciation variation using phonological rule doesn’t enhance the recognition performance, but  using these rules to  handle cross-word variation provide a good performance.
Ibrahim El-Henawy, Marwa Abo-Elazm
visibility 64718
download 6773
Full Length Article DOI: https://doi.org/10.54216/JISIoT.010201

Improving the Security and Authentication of the Cloud with IoT using Hybrid Optimization Based Quantum Hash Function

The security with the protection of IoT is to stay a consequential test, for the most part, because of the huge scale and dispersed nature of IoT systems. A cloud server brings wide pertinence of IoT in numerous businesses just as Government parts. Be that as it may, the security concerns, for example, verification and information protection of these gadgets assume a key job in fruitful coordination of two innovations. To build the security here, a quantum hash work system and hybrid cuckoo search-Artificial Bee Colony algorithm is displayed. A quantum hash work has been presented as an amazing system for secure correspondence of IoT and cloud because of its irregular disordered robust execution, greater affectability for introductory authority dimension, steadiness, and the exceptionally huge crucial area is hypothetically sufficiently able to oppose different known assaults. Cloud servers utilizing CS-ABC to upgrading the safe calculations through a quantum channel inside the cloud framework. Execution examinations and recreation outcomes demonstrate our presented methods are portrayed and also have greater safety, proficiency with strength opposed to a few surely understood assaults which choose them as a great contender for verifying cloud and IoT applications.
K. Shankar
visibility 65856
download 6757
Full Length Article DOI: https://doi.org/10.54216/JCIM.010202

Authenticating IoT Devices issues based on Blockchain

The Internet of Things (IoT) is increasingly an authenticity today. Nevertheless, some key challenges still need to be given care so that IoT solutions further support the rising demand for connected devices and the facilities offered. Outstanding to the possible significance and sensitivity of facilities, IoT solutions should address the security and privacy worries nearby these devices and the data they assemble, generate, and process. Recently, Blockchain technology has increased much attention in IoT solutions. Its principal usage conditions are in the financial domain, where Blockchain creates a capable application world and can be leveraged to explain security and privacy issues. However, this developing technology has a great possibility in the most various technological areas and can significantly help achieve the Internet of Things view in different features, increasing the measurements of decentralization, facilitating communications, allowing new transaction models, and allowing independent coordination of the devices. The paper's goal is to provide the ideas about the structure and operation of Blockchain and, typically, analyze how the use of this technology can be used to deliver security and privacy in IoT.
Hosny. H. Abo Emira
visibility 60114
download 5260