Post-Refactoring Recovery of Unit Tests: An Automated Approach DOI Open Access
Abdallah Qusef, Sharefa Murad, Najeh Rajeh Alsalhi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(08), P. 39 - 58

Published: April 26, 2023

— In application development lifecycle, specifically in test-driven development, refactoring plays a crucial role sustaining ease. However, in-spite of bringing ease, does not ensure the desired behaviour code after it is applied. Because tends to worsen alignments between source and its corresponding units. One significant solution aforementioned issue technique called unit testing. As testing enable developers confidently apply while avoiding undesired behaviour. Unit provides effective preventive measures for bugs by providing immediate feedback, thus assisting mitigate fear change. this work, we present tool GreenRefPlus which efficiently enables maintain veracity process The proposed automatic recovery tests refactored. consider Java as our target programming language focus on five various types refactoring, include Rename Method, Extract Move Parameter Addition Removal. Our experiments indicate that us consistently refactor tests. results presented work reveal assists saving approximately 43% total time required manually recover from broken

Language: Английский

Fuzzy decision-making framework for explainable golden multi-machine learning models for real-time adversarial attack detection in Vehicular Ad-hoc Networks DOI Creative Commons
A. S. Albahri, Rula A. Hamid,

Ahmed Raheem Abdulnabi

et al.

Information Fusion, Journal Year: 2023, Volume and Issue: 105, P. 102208 - 102208

Published: Dec. 27, 2023

This paper addresses various issues in the literature concerning adversarial attack detection Vehicular Ad-hoc Networks (VANETs). These include failure to consider both normal and perspectives simultaneously Machine Learning (ML) model development, lack of diversity preprocessing techniques for VANETs communication datasets, inadequate selection guidelines real-time models, limited emphasis on explainability detection. In this study, we propose an original fuzzy decision-making framework that incorporates multiple fusion standpoints. Our aims evaluate multi-ML models VANETs, focusing three stages. The first stage involves identifying Dedicated Short-Range Communication (DSRC) data using standard approaches. Two scenarios, jammed, are considered, resulting two DSRC datasets. second stage, develop based datasets feature dataset-1 dataset-2, respectively. third evaluates a approach Fuzzy Decision by Opinion Score Method (FDOSM) decision matrix. External Fusion (EFD) settings FDOSM address individual ranking variance, provide unique rank select best model. Experimental results demonstrate K-Nearest Neighbors Algorithm (kNN) achieves highest explain score 0.2048 preprocessing, while Random Forest (RF) applied dataset-2 emerges as most robust golden against attacks, with 0.1819. finding suggests Principal Component Analysis (PCA) is more suitable addressing perspectives. Furthermore, our undergoes evaluation terms systematic rank, sensitivity analysis, comparison analysis. Overall, provides valuable insights researchers practitioners informing execution, selection, interpretation tackle problems effectively. new demonstrates effective.

Language: Английский

Citations

23

Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET DOI
Muhammad Asad Saleem, Xiong Li, Khalid Mahmood

et al.

IEEE Transactions on Consumer Electronics, Journal Year: 2023, Volume and Issue: 70(1), P. 1747 - 1756

Published: Oct. 16, 2023

Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents and fuel usage, alleviating congestion, shortening travel time, enhancing overall transportation safety. These systems leverage advanced customer-centric communication networked control methods, such as inter-vehicle, vehicle-to-roadside (V2R), vehicle-to-vehicle (V2V) through use vehicular ad hoc networks (VANETs) cover all aspects transportation-based information. In existing systems, once devices are registered with a Trusted Authority (TA), subsequent authentication still relies on TA's assistance. However, these typically remain stationary, frequent interaction TA becomes impractical costly in highly mobile VANET environments. To address this challenge, we propose secure access protocol conditional privacy for VANETs. Unlike other protocols, our does not require involvement during between vehicles RSUs. Additionally, leverages pseudonym mechanisms provide privacy, enabling legitimate anonymous while malicious ones can be tracked. Our proposed scheme is supported by both formal informal security analyses has been shown against known attacks Furthermore, compared relevant studies, achieves 30.2505% efficiency terms computation cost 11.09276% cost, respectively.

Language: Английский

Citations

21

Hiding Information in Digital Images Using LSB Steganography Technique DOI Open Access
Sabah Abdulazeez Jebur, Abbas Khalifa Nawar,

Lubna Emad Kadhim

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(07), P. 167 - 178

Published: April 5, 2023

The highest way to protect data from intruder and unauthorized persons has become a major issue. This matter led the development of many techniques for security, such as Steganography, Cryptography, Watermarking disguise data. paper proposes an image steganography method using Least Significant Bits (LSB) technique XOR operator secret key, through which key is transformed into one-dimensional bit stream array, then these bits are XORed with image. Multiple experiments have been performed embed color grayscale images inside cover media. In this work, LSB ideal in two ways: firstly, only least significant one-bit (1bit) each byte will store embedded data, named (1-LSB). Secondly, four right half-byte (4 bits) (4-LSB). Subjective objective analyzes were process. subjective analysis responsible both HVS histogram, whereas involved PSNR MSE metrics.

Language: Английский

Citations

15

Impact of Deep Learning Strategy in Mathematics Achievement and Practical Intelligence among High School Students DOI Open Access

Sabah Saeed Hammadi,

Ban Hassan Majeed, Areej Khuder Hassan

et al.

International Journal of Emerging Technologies in Learning (iJET), Journal Year: 2023, Volume and Issue: 18(06), P. 42 - 52

Published: March 21, 2023

— To identify the effect of deep learning strategy on mathematics achievement and practical intelligence among secondary school students during 2022/2023 academic year. In research, experimental research method with two groups (experimental control) a post-test were adopted. The community is represented by female fifth scientific grade from first Karkh Education Directorate. (61) intentionally chosen, they divided into groups: an group (30) who taught according to proposed strategy, control (31) usual method. For purpose collecting data for experiment, test was built, which in its final form (25) items out (20) objective type both them. Based findings, studied strategies outperformed those traditional.

Language: Английский

Citations

13

The Impact of a Scenario-Based Learning Model in Mathematics Achievement and Mental Motivation for High School Students DOI Open Access
Areej Khuder Hassan,

Sabah Saeed Hammadi,

Ban Hassan Majeed

et al.

International Journal of Emerging Technologies in Learning (iJET), Journal Year: 2023, Volume and Issue: 18(07), P. 103 - 115

Published: April 5, 2023

The aim of the research is to identify effect a scenario-based learning in mathematics achievement and mental motivation for fifth - scientific grade students high school. To achieve it, researchers adopted experimental method with two groups (experimental control) post-test. community was identified, which represents from first Karkh Education Directorate. sample (60) were chosen intentionally, divided into groups: an group that studied according model; control usual method. For purpose collecting data experiment, test built, its final form, consisting (10) items type essay, scale, items. Appropriate statistical analyzes conducted, psychometric properties scale confirmed. results indicated who model outperformed traditional

Language: Английский

Citations

7

Network security, trust & privacy in a wiredwireless Environments–An Overview DOI
Ramiz Salama, Fadi Al‐Turjman,

Shruti Bhatla

et al.

Published: April 20, 2023

In this report, we explore the key challenges and threats facing network security in wired wireless environments, as well technologies best practices for addressing these challenges. We provide an overview of concepts terminology related to security, trust, privacy, discuss role encryption maintaining trust privacy environments. also examine common attack vectors countermeasures offer some recommendations realm security.

Language: Английский

Citations

7

A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection DOI Open Access

Raghad Abdulaali Azeez,

Abeer Salim Jamil, Mohammed Salih Mahdi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(07), P. 69 - 81

Published: April 5, 2023

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security with compound information, abused situations, participation on global transmission media real-world experiences are extremely significant. For minifying the counting needs for vast size of image info time needful to be address computationally. consequently, partial encryption user-face picked. This study focuses large technique that designed encrypt face slightly. Primarily, dlib utilizing detection. Susan one top edge detectors valuable localization characteristics marked edges, used extract features vectors from user faces. Moreover, relevance suggested generating key led crucial role improvement by producing them as difficult intruders. According PSNR values, recommended algorithms provided an adequate outcome encryption, they had lower encrypting duration larger impact.

Language: Английский

Citations

5

The Effect of Cognitive Modeling in Mathematics Achievement and Creative Intelligence for High School Students DOI Open Access
Ban Hassan Majeed, Areej Khuder Hassan,

Sabah Saeed Hammadi

et al.

International Journal of Emerging Technologies in Learning (iJET), Journal Year: 2023, Volume and Issue: 18(09), P. 203 - 215

Published: May 10, 2023

To identify the impact of cognitive modeling in mathematics achievement, creative intelligence for secondary school students during 2022/2023 academic year. achieve aim research, researchers adopted experimental research method with two groups (experimental; control) a post-test. Community was identified, which represented by second intermediate grade /first KED. (70) male were intentionally chosen as sample study, and they divided into groups: an who taught according to modeling, other control group studied usual method. Equivalence made between chronological age, level intelligence, previous achievement mathematics. For purpose collecting data experiment, test built its final form (20) also out (25) paragraph from thematic type both them. Appropriate statistical analyzes carried out, besides done making sure psychometric properties tests. Based on findings, excelled over those traditional.

Language: Английский

Citations

5

Image hiding by using spatial domain steganography DOI Creative Commons

Ghazali Sulong,

Maria A.Wimmer

Wasit Journal of Computer and Mathematics Science, Journal Year: 2023, Volume and Issue: 2(1), P. 25 - 29

Published: March 30, 2023

This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information plain sight, making it difficult unauthorized parties detect or access the information. Spatial domain popular within images, where least significant bits cover image are modified embed secret image. The discusses advantages various applications such as digital watermarking secure communication. also techniques used spatial steganography, how these can be implemented using programming languages Python. Finally, concludes by emphasizing importance responsibly ethically.

Language: Английский

Citations

4

A scalable blockchain storage scheme for VANET DOI

Wenxiang Wei,

Nafei Zhu, Jian Wang

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: 27(4), P. 3957 - 3981

Published: Feb. 2, 2024

Language: Английский

Citations

1