Big data cloud-based recommendation system using NLP techniques with machine ...TELKOMNIKA JOURNAL
Recommendation systems (RS) are crucial for social networking sites. Without it, finding precise products is harder. However, existing systems lack adequate efficiency, especially with big data. This paper presents a prototype cloud-based recommendation system for processing big data. The proposed work is implemented by utilizing the matrix factorization method with three approaches. In the first approach, singular value decomposition (SVD) is used, which is an old and traditional recommendation technique. The second recommendation approach is fine-tuned using the alternating least squares (ALS) algorithm with Apache Spark. Finally, the deep neural network (DNN) algorithm is utilized with TensorFlow. This study solves the challenge of handling large-scale datasets in the collaborative filtering (CF) technique after tuning the algorithms by adjusting the parameters in the second approach, which uses machine learning, as well as in the third approach, which uses deep learning. Furthermore, the results of these two approaches outperformed conventional techniques and achieved an acceptable computational time. The dataset size is about 1.5 GB and it is collected from the Goodreads website API. Moreover, the Hadoop distributed file system (HDFS) is used as cloud storage instead of the computer’s local disk for handling larger dataset sizes in the future.
This document describes a proposed multi-agent system for searching distributed data. The system uses three types of agents - coordinator agents, search agents, and local agents. Coordinator agents coordinate the retrieval process by creating search agents and collecting results. Search agents carry queries to nodes containing relevant databases. Local agents reside at nodes with databases, accept queries from search agents, search the databases for answers, and return results to the search agents. The system aims to retrieve data from distributed databases with minimum network bandwidth consumption using this multi-agent approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes an article that proposes a novel approach called NOFITC (Near Real Time Online Flow-based Internet Traffic Classification) for online network traffic classification using machine learning. The approach customizes an open source C4.5 algorithm to work for online classification of NetFlow data in real-time. It evaluates the accuracy and processing time of the approach by comparing its performance to Weka's C4.5 implementation and a packet sniffing program on collected network traffic data. The results show that the accuracy is identical to C4.5 and it can classify NetFlow packets with no packet loss due to parallel processing, demonstrating it can perform online traffic classification in real-time.
Application Identification Using Supervised Clustering MethodYolanda Ivey
This document summarizes research on using supervised clustering methods for network traffic classification. It discusses previous work on unsupervised and supervised clustering approaches. It then describes a proposed supervised clustering method called Flow Level based Classification (FLC) that classifies network flows in two phases: 1) A learning phase that clusters flows and calculates average packet sizes to create a reference table for classification. 2) A classification phase that groups new flows by transport protocol, port numbers, and packet similarities before comparing to the reference table to identify applications. The method aims to accurately classify traffic even if packet payloads are encrypted.
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, IoT and Computational Techniques
Dr. Shruti Aggarwal, Christo Ananth, Dr. Manik Rakhra
Thapar University, India
Professor, Samarkand State University, Uzbekistan
Lovely Professional University, India3
Big data cloud-based recommendation system using NLP techniques with machine ...TELKOMNIKA JOURNAL
Recommendation systems (RS) are crucial for social networking sites. Without it, finding precise products is harder. However, existing systems lack adequate efficiency, especially with big data. This paper presents a prototype cloud-based recommendation system for processing big data. The proposed work is implemented by utilizing the matrix factorization method with three approaches. In the first approach, singular value decomposition (SVD) is used, which is an old and traditional recommendation technique. The second recommendation approach is fine-tuned using the alternating least squares (ALS) algorithm with Apache Spark. Finally, the deep neural network (DNN) algorithm is utilized with TensorFlow. This study solves the challenge of handling large-scale datasets in the collaborative filtering (CF) technique after tuning the algorithms by adjusting the parameters in the second approach, which uses machine learning, as well as in the third approach, which uses deep learning. Furthermore, the results of these two approaches outperformed conventional techniques and achieved an acceptable computational time. The dataset size is about 1.5 GB and it is collected from the Goodreads website API. Moreover, the Hadoop distributed file system (HDFS) is used as cloud storage instead of the computer’s local disk for handling larger dataset sizes in the future.
This document describes a proposed multi-agent system for searching distributed data. The system uses three types of agents - coordinator agents, search agents, and local agents. Coordinator agents coordinate the retrieval process by creating search agents and collecting results. Search agents carry queries to nodes containing relevant databases. Local agents reside at nodes with databases, accept queries from search agents, search the databases for answers, and return results to the search agents. The system aims to retrieve data from distributed databases with minimum network bandwidth consumption using this multi-agent approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes an article that proposes a novel approach called NOFITC (Near Real Time Online Flow-based Internet Traffic Classification) for online network traffic classification using machine learning. The approach customizes an open source C4.5 algorithm to work for online classification of NetFlow data in real-time. It evaluates the accuracy and processing time of the approach by comparing its performance to Weka's C4.5 implementation and a packet sniffing program on collected network traffic data. The results show that the accuracy is identical to C4.5 and it can classify NetFlow packets with no packet loss due to parallel processing, demonstrating it can perform online traffic classification in real-time.
Application Identification Using Supervised Clustering MethodYolanda Ivey
This document summarizes research on using supervised clustering methods for network traffic classification. It discusses previous work on unsupervised and supervised clustering approaches. It then describes a proposed supervised clustering method called Flow Level based Classification (FLC) that classifies network flows in two phases: 1) A learning phase that clusters flows and calculates average packet sizes to create a reference table for classification. 2) A classification phase that groups new flows by transport protocol, port numbers, and packet similarities before comparing to the reference table to identify applications. The method aims to accurately classify traffic even if packet payloads are encrypted.
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, IoT and Computational Techniques
Dr. Shruti Aggarwal, Christo Ananth, Dr. Manik Rakhra
Thapar University, India
Professor, Samarkand State University, Uzbekistan
Lovely Professional University, India3
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
This document summarizes various anomaly detection techniques that can be used in multi-cloud architectures. It discusses statistical, data mining, and machine learning based techniques. A table compares 11 different anomaly detection models or frameworks, outlining their advantages and disadvantages. The document concludes that combining multiple techniques may generate better results for anomaly detection in clouds. Future work could optimize existing techniques or use unsupervised "black box" approaches without human intervention.
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBACijistjournal
The development of the cloud system,A large number of vendors can visit their users in the same platform directing their focus on the software rather than the underlying framework. This necessary require the distribution, storage analysis of the data on cloud accessing virtualized and scalable web services with broad application of cloud, the data security and access control become a major concern. The access to the cloud requires authorization as well as data accessibility permission. The verification and updation of data accessibility permissions and data must be done with proper knowledge which requires identification of correct updates and block listed users who are intruder to cloud Introducing the false data system. In this paper we approach to builds a mutual trust relationship between users and cloud for accessing control method in cloud computing environment focusing on the system integrity and its security. The proposed approach is executed as a procedure manner and includes many steps to identify the user’s credibility in the cloud network.
Dear All, Future-tec technologies Pvt Ltd,
Offers IEEE & Non IEEE projects on all Platforms and Domains. We also support with your own titles.
Regards,
ASHA DAS.P.K
Mob:9566216611
www.future-tec.co.in
Old 52,New 62,Floor 3,Espee Complex
Brindavan Street,West Mambalam,Chennai 33
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...Sara Perez
The document proposes a secure federated matrix factorization framework called FedMF. FedMF uses a distributed matrix factorization approach where each user computes gradients locally on their data and uploads the gradients (instead of raw data) to the server for training. While gradients seem secure, the document proves gradients can still leak users' raw data. Therefore, FedMF enhances the framework with homomorphic encryption to encrypt gradients, protecting privacy against a curious server. The authors implement a prototype of FedMF and test it on a movie rating dataset, verifying its feasibility. FedMF addresses limitations of prior work by not sacrificing accuracy like obfuscation methods or requiring a third party like encryption methods.
This document discusses security protocols for position-based routing in vehicular ad hoc networks (VANETs). It first provides background on VANETs and the need for secure routing protocols. It then reviews several existing security protocols for VANET routing, including those using digital signatures, anonymous keys, and group signatures. The document proposes an enhanced secure position-based protocol (SPBR) to address attacks like black hole attacks. It also discusses two specific security methods - hybrid signatures and an efficient scheme using HMAC and digital signatures. The document evaluates the performance of these methods through network simulation.
This document summarizes a research paper on improving security in position-based routing protocols for vehicular ad hoc networks (VANETs). It begins with background on VANETs and discusses challenges like attacks and security issues. It then proposes a new enhanced position-based routing protocol that can detect and defend against malicious nodes dropping packets, like in a black hole attack. This is achieved using digital signatures for authentication and estimating nodes' reliability based on their packet forwarding rates. The protocol is evaluated through network simulation and shows effectiveness in improving security.
This document summarizes a research paper on using cloud computing for intelligent transportation systems. The paper proposes using intelligent transportation clouds to provide services like traffic management strategies and decision support. It describes a prototype using multi-agent systems with mobile agents to manage traffic. Cloud computing can help handle large data storage and transportation needs efficiently. Intelligent transportation clouds could overcome issues with computing power, storage, and scalability faced by current traffic management systems.
This document discusses 6 different thesis abstracts on topics related to IT security:
1) The design and implementation of an environment to support security assessment method development. This includes a database solution to assist developers.
2) A risk analysis of an RFID system used for logistics that identifies vehicles. The analysis examines the RFID communication and database transmission security and risks.
3) Key topics for a database security course, including technologies, access control, vulnerabilities, privacy, and secure database models.
4) A case-based reasoning approach to understand constraints in information models written in EXPRESS, representing constraints at a higher level of abstraction.
5) The benefits of a consolidated network security solution over point
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
This document discusses classifying network traffic using machine learning to provide quality of service in software defined networks. It aims to classify traffic by application to prioritize user required traffic and restrict unnecessary traffic like from over-the-top platforms to improve quality of service. The document reviews several related works applying techniques like naive bayes, support vector machines, and fuzzy logic for traffic classification and management in software defined networks to improve quality of service metrics.
This document analyzes the performance of various application protocols for mobile ad hoc networks (MANETs) using network simulation software. It simulates MANETs with different numbers of nodes (3, 5, 10 nodes) running the File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). The simulation measures three performance metrics - traffic received, network load, and media access delay - for each protocol as the number of nodes increases. The results show that as node count increases, network load and media access delay increase for both protocols, while traffic received decreases for FTP but does not change linearly for HTTP. The document concludes that increasing nodes degrades performance for MANET applications.
This document analyzes the performance of application protocols like HTTP and FTP in a mobile ad hoc network (MANET) using the network simulation tool OPNET. It describes 6 simulation scenarios with varying numbers of nodes. Traffic is generated using FTP and HTTP applications. Key metrics like throughput, network load, and media access delay are observed. The document finds that as the number of nodes increases, these performance metrics are affected.
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
Cloud computing has high applicability as an Internet based service that relies on sharing computing resources. Cloud computing provides services that are Infrastructure based, Platform based and Software based. The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility. The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks. To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security. Such a coherent and proficient Intrusion Detection System is proposed in this paper to achieve higher certainty levels regarding safety in cloud environment. In this paper, the mating behavior of peafowl is incorporated into an optimization algorithm which in turn is used as a feature selection algorithm. The algorithm is used to reduce the huge size of cloud data so that the IDS can work efficiently on the cloud to detect intrusions. The proposed model has been experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to be a better as well as an efficient IDS.
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
Cloud computing has high applicability as an Internet based service that relies on sharing computing resources. Cloud computing provides services that are Infrastructure based, Platform based and Software based. The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility. The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks. To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security. Such a coherent and proficient Intrusion Detection System is proposed in this paper to achieve higher certainty levels regarding safety in cloud environment. In this paper, the mating behavior of peafowl is incorporated into an optimization algorithm which in turn is used as a feature selection algorithm. The algorithm is used to reduce the huge size of cloud data so that the IDS can work efficiently on the cloud to detect intrusions. The proposed model has been experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to be a better as well as an efficient IDS.
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...ijngnjournal
IP Multimedia Subsystem (IMS) is considered to be one of the important features in Mobile Next Generation Networks (MNGN). It adds value to the mobile services and applications by integrating mobile network resources, such as location, billing and authentication. This is achieved by enabling a third party access to network resources. In previous work [1] we have presented a testbed to be used as platform for testing mobile application prior to actual deployment. We have chosen a novel IMS based MObile Mass EXamination (MOMEX) system to showcase the benefit of designing an IMS based mobile application. We identify two aspects essential to of the application namely security threats and delay analysis. In this paper we identify MOMEX security threats and suggest strategies to mitigate system vulnerabilities. We then
evaluate the performance of MOMEX system in terms of delay and security threats and vulnerabilities. The results presented show system performance limitation and tradeoffs.
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆Sérgio Sacani
Context. The early-type galaxy SDSS J133519.91+072807.4 (hereafter SDSS1335+0728), which had exhibited no prior optical variations during the preceding two decades, began showing significant nuclear variability in the Zwicky Transient Facility (ZTF) alert stream from December 2019 (as ZTF19acnskyy). This variability behaviour, coupled with the host-galaxy properties, suggests that SDSS1335+0728 hosts a ∼ 106M⊙ black hole (BH) that is currently in the process of ‘turning on’. Aims. We present a multi-wavelength photometric analysis and spectroscopic follow-up performed with the aim of better understanding the origin of the nuclear variations detected in SDSS1335+0728. Methods. We used archival photometry (from WISE, 2MASS, SDSS, GALEX, eROSITA) and spectroscopic data (from SDSS and LAMOST) to study the state of SDSS1335+0728 prior to December 2019, and new observations from Swift, SOAR/Goodman, VLT/X-shooter, and Keck/LRIS taken after its turn-on to characterise its current state. We analysed the variability of SDSS1335+0728 in the X-ray/UV/optical/mid-infrared range, modelled its spectral energy distribution prior to and after December 2019, and studied the evolution of its UV/optical spectra. Results. From our multi-wavelength photometric analysis, we find that: (a) since 2021, the UV flux (from Swift/UVOT observations) is four times brighter than the flux reported by GALEX in 2004; (b) since June 2022, the mid-infrared flux has risen more than two times, and the W1−W2 WISE colour has become redder; and (c) since February 2024, the source has begun showing X-ray emission. From our spectroscopic follow-up, we see that (i) the narrow emission line ratios are now consistent with a more energetic ionising continuum; (ii) broad emission lines are not detected; and (iii) the [OIII] line increased its flux ∼ 3.6 years after the first ZTF alert, which implies a relatively compact narrow-line-emitting region. Conclusions. We conclude that the variations observed in SDSS1335+0728 could be either explained by a ∼ 106M⊙ AGN that is just turning on or by an exotic tidal disruption event (TDE). If the former is true, SDSS1335+0728 is one of the strongest cases of an AGNobserved in the process of activating. If the latter were found to be the case, it would correspond to the longest and faintest TDE ever observed (or another class of still unknown nuclear transient). Future observations of SDSS1335+0728 are crucial to further understand its behaviour. Key words. galaxies: active– accretion, accretion discs– galaxies: individual: SDSS J133519.91+072807.4
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
This document summarizes various anomaly detection techniques that can be used in multi-cloud architectures. It discusses statistical, data mining, and machine learning based techniques. A table compares 11 different anomaly detection models or frameworks, outlining their advantages and disadvantages. The document concludes that combining multiple techniques may generate better results for anomaly detection in clouds. Future work could optimize existing techniques or use unsupervised "black box" approaches without human intervention.
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBACijistjournal
The development of the cloud system,A large number of vendors can visit their users in the same platform directing their focus on the software rather than the underlying framework. This necessary require the distribution, storage analysis of the data on cloud accessing virtualized and scalable web services with broad application of cloud, the data security and access control become a major concern. The access to the cloud requires authorization as well as data accessibility permission. The verification and updation of data accessibility permissions and data must be done with proper knowledge which requires identification of correct updates and block listed users who are intruder to cloud Introducing the false data system. In this paper we approach to builds a mutual trust relationship between users and cloud for accessing control method in cloud computing environment focusing on the system integrity and its security. The proposed approach is executed as a procedure manner and includes many steps to identify the user’s credibility in the cloud network.
Dear All, Future-tec technologies Pvt Ltd,
Offers IEEE & Non IEEE projects on all Platforms and Domains. We also support with your own titles.
Regards,
ASHA DAS.P.K
Mob:9566216611
www.future-tec.co.in
Old 52,New 62,Floor 3,Espee Complex
Brindavan Street,West Mambalam,Chennai 33
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...Sara Perez
The document proposes a secure federated matrix factorization framework called FedMF. FedMF uses a distributed matrix factorization approach where each user computes gradients locally on their data and uploads the gradients (instead of raw data) to the server for training. While gradients seem secure, the document proves gradients can still leak users' raw data. Therefore, FedMF enhances the framework with homomorphic encryption to encrypt gradients, protecting privacy against a curious server. The authors implement a prototype of FedMF and test it on a movie rating dataset, verifying its feasibility. FedMF addresses limitations of prior work by not sacrificing accuracy like obfuscation methods or requiring a third party like encryption methods.
This document discusses security protocols for position-based routing in vehicular ad hoc networks (VANETs). It first provides background on VANETs and the need for secure routing protocols. It then reviews several existing security protocols for VANET routing, including those using digital signatures, anonymous keys, and group signatures. The document proposes an enhanced secure position-based protocol (SPBR) to address attacks like black hole attacks. It also discusses two specific security methods - hybrid signatures and an efficient scheme using HMAC and digital signatures. The document evaluates the performance of these methods through network simulation.
This document summarizes a research paper on improving security in position-based routing protocols for vehicular ad hoc networks (VANETs). It begins with background on VANETs and discusses challenges like attacks and security issues. It then proposes a new enhanced position-based routing protocol that can detect and defend against malicious nodes dropping packets, like in a black hole attack. This is achieved using digital signatures for authentication and estimating nodes' reliability based on their packet forwarding rates. The protocol is evaluated through network simulation and shows effectiveness in improving security.
This document summarizes a research paper on using cloud computing for intelligent transportation systems. The paper proposes using intelligent transportation clouds to provide services like traffic management strategies and decision support. It describes a prototype using multi-agent systems with mobile agents to manage traffic. Cloud computing can help handle large data storage and transportation needs efficiently. Intelligent transportation clouds could overcome issues with computing power, storage, and scalability faced by current traffic management systems.
This document discusses 6 different thesis abstracts on topics related to IT security:
1) The design and implementation of an environment to support security assessment method development. This includes a database solution to assist developers.
2) A risk analysis of an RFID system used for logistics that identifies vehicles. The analysis examines the RFID communication and database transmission security and risks.
3) Key topics for a database security course, including technologies, access control, vulnerabilities, privacy, and secure database models.
4) A case-based reasoning approach to understand constraints in information models written in EXPRESS, representing constraints at a higher level of abstraction.
5) The benefits of a consolidated network security solution over point
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
This document discusses classifying network traffic using machine learning to provide quality of service in software defined networks. It aims to classify traffic by application to prioritize user required traffic and restrict unnecessary traffic like from over-the-top platforms to improve quality of service. The document reviews several related works applying techniques like naive bayes, support vector machines, and fuzzy logic for traffic classification and management in software defined networks to improve quality of service metrics.
This document analyzes the performance of various application protocols for mobile ad hoc networks (MANETs) using network simulation software. It simulates MANETs with different numbers of nodes (3, 5, 10 nodes) running the File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). The simulation measures three performance metrics - traffic received, network load, and media access delay - for each protocol as the number of nodes increases. The results show that as node count increases, network load and media access delay increase for both protocols, while traffic received decreases for FTP but does not change linearly for HTTP. The document concludes that increasing nodes degrades performance for MANET applications.
This document analyzes the performance of application protocols like HTTP and FTP in a mobile ad hoc network (MANET) using the network simulation tool OPNET. It describes 6 simulation scenarios with varying numbers of nodes. Traffic is generated using FTP and HTTP applications. Key metrics like throughput, network load, and media access delay are observed. The document finds that as the number of nodes increases, these performance metrics are affected.
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
Cloud computing has high applicability as an Internet based service that relies on sharing computing resources. Cloud computing provides services that are Infrastructure based, Platform based and Software based. The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility. The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks. To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security. Such a coherent and proficient Intrusion Detection System is proposed in this paper to achieve higher certainty levels regarding safety in cloud environment. In this paper, the mating behavior of peafowl is incorporated into an optimization algorithm which in turn is used as a feature selection algorithm. The algorithm is used to reduce the huge size of cloud data so that the IDS can work efficiently on the cloud to detect intrusions. The proposed model has been experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to be a better as well as an efficient IDS.
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
Cloud computing has high applicability as an Internet based service that relies on sharing computing resources. Cloud computing provides services that are Infrastructure based, Platform based and Software based. The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility. The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks. To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security. Such a coherent and proficient Intrusion Detection System is proposed in this paper to achieve higher certainty levels regarding safety in cloud environment. In this paper, the mating behavior of peafowl is incorporated into an optimization algorithm which in turn is used as a feature selection algorithm. The algorithm is used to reduce the huge size of cloud data so that the IDS can work efficiently on the cloud to detect intrusions. The proposed model has been experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to be a better as well as an efficient IDS.
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...ijngnjournal
IP Multimedia Subsystem (IMS) is considered to be one of the important features in Mobile Next Generation Networks (MNGN). It adds value to the mobile services and applications by integrating mobile network resources, such as location, billing and authentication. This is achieved by enabling a third party access to network resources. In previous work [1] we have presented a testbed to be used as platform for testing mobile application prior to actual deployment. We have chosen a novel IMS based MObile Mass EXamination (MOMEX) system to showcase the benefit of designing an IMS based mobile application. We identify two aspects essential to of the application namely security threats and delay analysis. In this paper we identify MOMEX security threats and suggest strategies to mitigate system vulnerabilities. We then
evaluate the performance of MOMEX system in terms of delay and security threats and vulnerabilities. The results presented show system performance limitation and tradeoffs.
Similar to Privacy-preserving blockchain-based federated learning for traffic flow prediction (20)
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆Sérgio Sacani
Context. The early-type galaxy SDSS J133519.91+072807.4 (hereafter SDSS1335+0728), which had exhibited no prior optical variations during the preceding two decades, began showing significant nuclear variability in the Zwicky Transient Facility (ZTF) alert stream from December 2019 (as ZTF19acnskyy). This variability behaviour, coupled with the host-galaxy properties, suggests that SDSS1335+0728 hosts a ∼ 106M⊙ black hole (BH) that is currently in the process of ‘turning on’. Aims. We present a multi-wavelength photometric analysis and spectroscopic follow-up performed with the aim of better understanding the origin of the nuclear variations detected in SDSS1335+0728. Methods. We used archival photometry (from WISE, 2MASS, SDSS, GALEX, eROSITA) and spectroscopic data (from SDSS and LAMOST) to study the state of SDSS1335+0728 prior to December 2019, and new observations from Swift, SOAR/Goodman, VLT/X-shooter, and Keck/LRIS taken after its turn-on to characterise its current state. We analysed the variability of SDSS1335+0728 in the X-ray/UV/optical/mid-infrared range, modelled its spectral energy distribution prior to and after December 2019, and studied the evolution of its UV/optical spectra. Results. From our multi-wavelength photometric analysis, we find that: (a) since 2021, the UV flux (from Swift/UVOT observations) is four times brighter than the flux reported by GALEX in 2004; (b) since June 2022, the mid-infrared flux has risen more than two times, and the W1−W2 WISE colour has become redder; and (c) since February 2024, the source has begun showing X-ray emission. From our spectroscopic follow-up, we see that (i) the narrow emission line ratios are now consistent with a more energetic ionising continuum; (ii) broad emission lines are not detected; and (iii) the [OIII] line increased its flux ∼ 3.6 years after the first ZTF alert, which implies a relatively compact narrow-line-emitting region. Conclusions. We conclude that the variations observed in SDSS1335+0728 could be either explained by a ∼ 106M⊙ AGN that is just turning on or by an exotic tidal disruption event (TDE). If the former is true, SDSS1335+0728 is one of the strongest cases of an AGNobserved in the process of activating. If the latter were found to be the case, it would correspond to the longest and faintest TDE ever observed (or another class of still unknown nuclear transient). Future observations of SDSS1335+0728 are crucial to further understand its behaviour. Key words. galaxies: active– accretion, accretion discs– galaxies: individual: SDSS J133519.91+072807.4
Signatures of wave erosion in Titan’s coastsSérgio Sacani
The shorelines of Titan’s hydrocarbon seas trace flooded erosional landforms such as river valleys; however, it isunclear whether coastal erosion has subsequently altered these shorelines. Spacecraft observations and theo-retical models suggest that wind may cause waves to form on Titan’s seas, potentially driving coastal erosion,but the observational evidence of waves is indirect, and the processes affecting shoreline evolution on Titanremain unknown. No widely accepted framework exists for using shoreline morphology to quantitatively dis-cern coastal erosion mechanisms, even on Earth, where the dominant mechanisms are known. We combinelandscape evolution models with measurements of shoreline shape on Earth to characterize how differentcoastal erosion mechanisms affect shoreline morphology. Applying this framework to Titan, we find that theshorelines of Titan’s seas are most consistent with flooded landscapes that subsequently have been eroded bywaves, rather than a uniform erosional process or no coastal erosion, particularly if wave growth saturates atfetch lengths of tens of kilometers.
BIRDS DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptxgoluk9330
Ahota Beel, nestled in Sootea Biswanath Assam , is celebrated for its extraordinary diversity of bird species. This wetland sanctuary supports a myriad of avian residents and migrants alike. Visitors can admire the elegant flights of migratory species such as the Northern Pintail and Eurasian Wigeon, alongside resident birds including the Asian Openbill and Pheasant-tailed Jacana. With its tranquil scenery and varied habitats, Ahota Beel offers a perfect haven for birdwatchers to appreciate and study the vibrant birdlife that thrives in this natural refuge.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
PPT on Direct Seeded Rice presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Sérgio Sacani
Context. The observation of several L-band emission sources in the S cluster has led to a rich discussion of their nature. However, a definitive answer to the classification of the dusty objects requires an explanation for the detection of compact Doppler-shifted Brγ emission. The ionized hydrogen in combination with the observation of mid-infrared L-band continuum emission suggests that most of these sources are embedded in a dusty envelope. These embedded sources are part of the S-cluster, and their relationship to the S-stars is still under debate. To date, the question of the origin of these two populations has been vague, although all explanations favor migration processes for the individual cluster members. Aims. This work revisits the S-cluster and its dusty members orbiting the supermassive black hole SgrA* on bound Keplerian orbits from a kinematic perspective. The aim is to explore the Keplerian parameters for patterns that might imply a nonrandom distribution of the sample. Additionally, various analytical aspects are considered to address the nature of the dusty sources. Methods. Based on the photometric analysis, we estimated the individual H−K and K−L colors for the source sample and compared the results to known cluster members. The classification revealed a noticeable contrast between the S-stars and the dusty sources. To fit the flux-density distribution, we utilized the radiative transfer code HYPERION and implemented a young stellar object Class I model. We obtained the position angle from the Keplerian fit results; additionally, we analyzed the distribution of the inclinations and the longitudes of the ascending node. Results. The colors of the dusty sources suggest a stellar nature consistent with the spectral energy distribution in the near and midinfrared domains. Furthermore, the evaporation timescales of dusty and gaseous clumps in the vicinity of SgrA* are much shorter ( 2yr) than the epochs covered by the observations (≈15yr). In addition to the strong evidence for the stellar classification of the D-sources, we also find a clear disk-like pattern following the arrangements of S-stars proposed in the literature. Furthermore, we find a global intrinsic inclination for all dusty sources of 60 ± 20◦, implying a common formation process. Conclusions. The pattern of the dusty sources manifested in the distribution of the position angles, inclinations, and longitudes of the ascending node strongly suggests two different scenarios: the main-sequence stars and the dusty stellar S-cluster sources share a common formation history or migrated with a similar formation channel in the vicinity of SgrA*. Alternatively, the gravitational influence of SgrA* in combination with a massive perturber, such as a putative intermediate mass black hole in the IRS 13 cluster, forces the dusty objects and S-stars to follow a particular orbital arrangement. Key words. stars: black holes– stars: formation– Galaxy: center– galaxies: star formation
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...Sérgio Sacani
Magmatic iron-meteorite parent bodies are the earliest planetesimals in the Solar System,and they preserve information about conditions and planet-forming processes in thesolar nebula. In this study, we include comprehensive elemental compositions andfractional-crystallization modeling for iron meteorites from the cores of five differenti-ated asteroids from the inner Solar System. Together with previous results of metalliccores from the outer Solar System, we conclude that asteroidal cores from the outerSolar System have smaller sizes, elevated siderophile-element abundances, and simplercrystallization processes than those from the inner Solar System. These differences arerelated to the formation locations of the parent asteroids because the solar protoplane-tary disk varied in redox conditions, elemental distributions, and dynamics at differentheliocentric distances. Using highly siderophile-element data from iron meteorites, wereconstruct the distribution of calcium-aluminum-rich inclusions (CAIs) across theprotoplanetary disk within the first million years of Solar-System history. CAIs, the firstsolids to condense in the Solar System, formed close to the Sun. They were, however,concentrated within the outer disk and depleted within the inner disk. Future modelsof the structure and evolution of the protoplanetary disk should account for this dis-tribution pattern of CAIs.
Embracing Deep Variability For Reproducibility and Replicability
Abstract: Reproducibility (aka determinism in some cases) constitutes a fundamental aspect in various fields of computer science, such as floating-point computations in numerical analysis and simulation, concurrency models in parallelism, reproducible builds for third parties integration and packaging, and containerization for execution environments. These concepts, while pervasive across diverse concerns, often exhibit intricate inter-dependencies, making it challenging to achieve a comprehensive understanding. In this short and vision paper we delve into the application of software engineering techniques, specifically variability management, to systematically identify and explicit points of variability that may give rise to reproducibility issues (eg language, libraries, compiler, virtual machine, OS, environment variables, etc). The primary objectives are: i) gaining insights into the variability layers and their possible interactions, ii) capturing and documenting configurations for the sake of reproducibility, and iii) exploring diverse configurations to replicate, and hence validate and ensure the robustness of results. By adopting these methodologies, we aim to address the complexities associated with reproducibility and replicability in modern software systems and environments, facilitating a more comprehensive and nuanced perspective on these critical aspects.
https://hal.science/hal-04582287
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...Scintica Instrumentation
Targeting Hsp90 and its pathogen Orthologs with Tethered Inhibitors as a Diagnostic and Therapeutic Strategy for cancer and infectious diseases with Dr. Timothy Haystead.
4. Research background
Background:
As accurate and timely traffic flow information is extremely important for traffic management,
traffic flow prediction has become a vital component of intelligent transportation systems. However,
existing traffic flow prediction methods based on centralized machine learning need to gather raw
data for model training, which involves serious privacy exposure risks.
8. 1. Fedrate Learning
The specific implementation of ideas
The goal of this paper is to achieve accurate and
timely TFP through a lightweight federated learning
scheme. Using GRU neural network as a lightweight
technology to predict future traffic flow and
implementing the application of FL in TFP systems.
9. Establish a dedicated consortium
blockchain and implement a decentralized
TFP system using FL. For the convenience of
system functionality, we first select a certain
number of RSUs as authorized miners. To this
end, upgrade the hardware configuration of
these RSUs to have powerful computing,
storage, and communication capabilities to
verify local model updates submitted by
distributed vehicles and identify low accuracy
and unreliable updates. Through carefully
designed consensus algorithms, they
generate a new block containing qualified
local model update records.
2. Distributed TFP Systems and Federated Learning
The specific implementation of ideas
10. Use a consensus algorithm called dBFT to execute the consensus process among miners; Only
qualified local model updates are aggregated to generate the latest global model.In this consensus
process, false or low-quality local model updates are not integrated into the global model training,
which improves the FL performance and reduces poisoning attacks. Therefore, the proposed
consortium blockchain with a dBFT-based consensus algorithm ensures the secure, reliable, and
privacy-preserving characteristics of the FL-based TFP method for ITS.
The specific implementation of ideas
3. Design of consortium blockchain
11.
12. step 1:
Initialization
Step 2:
Leader Selection
Step 3:
Local model training
Step 4:
Model update verification
The specific implementation steps of consensus algorithm
Step 5:
Candidate block
verification
Step 6:
Global model
training
13. The specific implementation of ideas
4.Local Differential Privacy Technology for Protecting Vehicle Communication Privacy in TFP
Definition 1: Participants should add random perturbations to the data. In order to protect the privacy of
vehicle location information in TFP tasks, a Gaussian mechanism is used to add carefully designed noise to
interfere with the location information. Firstly, define the Gaussian mechanism as defined in Definition 2:
Definition 2:Gaussian mechanism
Definition 3:Vehicle information after disturbance
17. Introduced a federated learning framework to protect the privacy of
vehicle data.
Applying GRU model to FL framework to obtain accurate TFP.
In order to prevent malicious attackers from damaging the urban traffic
flow management system, a decentralized FL framework has been
implemented using blockchain to defend against poisoning attacks.
Contrib
utions
Contribution of the paper
Using local differential privacy technology to protect privacy in vehicle
location sharing.
19. Conduct experiments and improve ideas, with a preliminary logic.
The second semester of the first year of graduate school
Complete your own experiment and prepare the preliminary draft of the paper.
The first semester of the second year of graduate school
Successfully issued the paper.
The second semester of the second year of graduate school
Successfully graduated.
Third year of graduate school
My own graduate plan
20. References
[1] Y. Lv, Y. Duan, W. Kang, Z. Li, F.Y. Wang, Traffic flow prediction with big data: a deep learning approach, IEEE
Trans. Intell. Transp. Syst. 16 (2014) 865–873.
[2] R. Vinayakumar, M. Alazab, S. Srinivasan, Q. Pham, S.K. Padannayil, K. Simran, A visualized botnet detection
system based deep learning for the internet of things networks of smart cities, IEEE Trans. Ind. Appl. 56 (2020)
4436–4456.
[3] X. Yang, et al., Deep relative attributes, IEEE Trans. Multimed. 18 (2016) 1832–1842.
[4] M.S. Hossain, M. Al-Hammadi, G. Muhammad, Automatic fruit classification using deep learning for
industrial applications, IEEE Trans. Ind. Inf. 15 (2019) 1027–1034.
[5] L. Lyu, J. Yu, K. Nandakumar, Y. Li, X. Ma, J. Jin, H. Yu, K.S. Ng, Towards fair and privacy-preserving federated
deep models, IEEE Trans. Parallel Distrib. Syst. 31 (2020) 2524–2541.
[6] K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, Learning phrase
representations using rnn encoder– decoder for statistical machine translation, 2014, arXiv preprint arXiv:
1406.1078.
21. TH
A
N
KS
2 0 2 4 年 03月
T h a n k y o u f o r w a t c h i n g