Current Issue : January-March Volume : 2022 Issue Number : 1 Articles : 5 Articles
The phenomenon of phishing has now been a common threat, since many individuals and webpages have been observed to be attacked by phishers. The common purpose of phishing activities is to obtain user’s personal information for illegitimate usage. Considering the growing intensity of the issue, this study is aimed at developing a new hybrid rule-based solution by incorporating six different algorithm models that may efficiently detect and control the phishing issue. The study incorporates 37 features extracted from six different methods including the black listed method, lexical and host method, content method, identity method, identity similarity method, visual similarity method, and behavioral method. Furthermore, comparative analysis was undertaken between different machine learning and deep learning models which includes CART (decision trees), SVM (support vector machines), or KNN (K-nearest neighbors) and deep learning models such as MLP (multilayer perceptron) and CNN (convolutional neural networks). Findings of the study indicated that the method was effective in analysing the URL stress through different viewpoints, leading towards the validity of the model. However, the highest accuracy level was obtained for deep learning with the given values of 97.945 for the CNN model and 93.216 for the MLP model, respectively. The study therefore concludes that the new hybrid solution must be implemented at a practical level to reduce phishing activities, due to its high efficiency and accuracy....
In the modern age, Wireless Body Area Network (WBAN) becomes very popular everywhere for monitoring healthcare services remotely. However, the WBAN system has lagged in efficient power consumption till now. As WBAN is formed with several portable devices, low power consumption will ensure battery lifetime. In this paper, an analysis of Transmission Power Control (TPC) over WBAN has been conducted. A ZigBee based WBAN model with different network topologies and data rates has been proposed in the experiment. WBAN data-management technique has been proposed due to reducing more data transmission. Less data transmission reduces overall power consumption. The whole work has been done using OPNET and OMNET++ network simulators. Six sensor nodes have been used with a Zig- Bee coordinator in the simulation scenario where throughput, load, delay, data traffic, amount of power consumption, packet delivery ratio, etc. have been used as simulation parameters. TPC analysis indicates the power consumptions in different topologies, with different data rates. Several simulation scenarios were run and the results were analyzed in this paper....
With the development of high-performance computing and big data applications, the scale of data transmitted, stored, and processed by high-performance computing cluster systems is increasing explosively. Efficient compression of large-scale data and reducing the space required for data storage and transmission is one of the keys to improving the performance of highperformance computing cluster systems. In this paper, we present SW-LZMA, a parallel design and optimization of LZMA based on the Sunway 26010 heterogeneous many-core processor. Combined with the characteristics of SW26010 processors, we analyse the storage space requirements, memory access characteristics, and hotspot functions of the LZMA algorithm and implement the thread-level parallelism of the LZMA algorithm based on Athread interface. Furthermore, we make a finegrained layout of LDM address space to achieve DMA double buffer cyclic sliding window algorithm, which optimizes the performance of SW-LZMA. The experimental results show that compared with the serial baseline implementation of LZMA, the parallel LZMA algorithm obtains a maximum speedup ratio of 4.1 times using the Silesia corpus benchmark, while on the large-scale data set, speedup is 5.3 times....
In unmanned aerial vehicle (UAV) collaborative electronic reconnaissance network, single UAV is always restricted by flyability and sensing capacity; hence, a cooperative network is built to realize the electronic reconnaissance. In this paper, a three-level electronic reconnaissance network is proposed, including the radiation target, UAV-based electronic reconnaissance equipment, and the command center. Each of the UAVs is capable of monitoring several radiation targets at the same time. Since the topology of the UAV network influences the effect of electronic reconnaissance, in this contribution, optimization is achieved based on the improvement of radiation coverage. If there is no radiation target within the sensing scope, the corresponding UAV will remove according to our novel strategy. Iterate operations are carried out for the relative optimum performance. Simulation results show that the UAV network topology optimization is capable of improving the coverage of radiation targets effectively....
Due to the great potential of the combination of machine learning technology and unmanned aerial vehicle (UAV) enabled wireless communications, various optimization algorithms on resource allocation have been proposed for the Internet of Things. UAVs not only can perform the missions under the extreme conditions but also enhance the overall performance of the system as an aerial relay assisting transmission in the public and civil domains, which have been received extensive attentions. However, with the limited capacity and power constraints, they are difficult to support the transmission for the big data information users. In addition, the lack of spectrum resource poses challenges to satisfy the quality of service (QoS) of mobile users in wireless networks. To contribute to these urgent problems, this article first studies the potential and effective applications of UAVs, by introducing the Chinese remainder theorem (CRT) and nonorthogonal multiple access (NOMA) technologies into UAV relay networks. Two scenarios with/without direct transmissions between the source and destination nodes are investigated, following the decomposition and reconstruction mechanisms to satisfy the big data information transmission. Considering the user fairness, we further discuss the effect of the UAV numbers to the overall system capacity. To maximize the system capacity, the designs of transmission protocol and receiver are also discussed, in various channel conditions. Finally, a low complexity and efficient two-stage power allocation scheme is established for the perspective of users and UAV relays....
Loading....