International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(08), P. 39 - 58
Published: April 26, 2023
—
In
application
development
lifecycle,
specifically
in
test-driven
development,
refactoring
plays
a
crucial
role
sustaining
ease.
However,
in-spite
of
bringing
ease,
does
not
ensure
the
desired
behaviour
code
after
it
is
applied.
Because
tends
to
worsen
alignments
between
source
and
its
corresponding
units.
One
significant
solution
aforementioned
issue
technique
called
unit
testing.
As
testing
enable
developers
confidently
apply
while
avoiding
undesired
behaviour.
Unit
provides
effective
preventive
measures
for
bugs
by
providing
immediate
feedback,
thus
assisting
mitigate
fear
change.
this
work,
we
present
tool
GreenRefPlus
which
efficiently
enables
maintain
veracity
process
The
proposed
automatic
recovery
tests
refactored.
consider
Java
as
our
target
programming
language
focus
on
five
various
types
refactoring,
include
Rename
Method,
Extract
Move
Parameter
Addition
Removal.
Our
experiments
indicate
that
us
consistently
refactor
tests.
results
presented
work
reveal
assists
saving
approximately
43%
total
time
required
manually
recover
from
broken
Information Fusion,
Journal Year:
2023,
Volume and Issue:
105, P. 102208 - 102208
Published: Dec. 27, 2023
This
paper
addresses
various
issues
in
the
literature
concerning
adversarial
attack
detection
Vehicular
Ad-hoc
Networks
(VANETs).
These
include
failure
to
consider
both
normal
and
perspectives
simultaneously
Machine
Learning
(ML)
model
development,
lack
of
diversity
preprocessing
techniques
for
VANETs
communication
datasets,
inadequate
selection
guidelines
real-time
models,
limited
emphasis
on
explainability
detection.
In
this
study,
we
propose
an
original
fuzzy
decision-making
framework
that
incorporates
multiple
fusion
standpoints.
Our
aims
evaluate
multi-ML
models
VANETs,
focusing
three
stages.
The
first
stage
involves
identifying
Dedicated
Short-Range
Communication
(DSRC)
data
using
standard
approaches.
Two
scenarios,
jammed,
are
considered,
resulting
two
DSRC
datasets.
second
stage,
develop
based
datasets
feature
dataset-1
dataset-2,
respectively.
third
evaluates
a
approach
Fuzzy
Decision
by
Opinion
Score
Method
(FDOSM)
decision
matrix.
External
Fusion
(EFD)
settings
FDOSM
address
individual
ranking
variance,
provide
unique
rank
select
best
model.
Experimental
results
demonstrate
K-Nearest
Neighbors
Algorithm
(kNN)
achieves
highest
explain
score
0.2048
preprocessing,
while
Random
Forest
(RF)
applied
dataset-2
emerges
as
most
robust
golden
against
attacks,
with
0.1819.
finding
suggests
Principal
Component
Analysis
(PCA)
is
more
suitable
addressing
perspectives.
Furthermore,
our
undergoes
evaluation
terms
systematic
rank,
sensitivity
analysis,
comparison
analysis.
Overall,
provides
valuable
insights
researchers
practitioners
informing
execution,
selection,
interpretation
tackle
problems
effectively.
new
demonstrates
effective.
IEEE Transactions on Consumer Electronics,
Journal Year:
2023,
Volume and Issue:
70(1), P. 1747 - 1756
Published: Oct. 16, 2023
Globally,
the
development
of
Intelligent
Cyber-Physical
Transportation
Systems
(ICTS)
aims
to
tackle
several
challenges,
including
reducing
traffic
accidents
and
fuel
usage,
alleviating
congestion,
shortening
travel
time,
enhancing
overall
transportation
safety.
These
systems
leverage
advanced
customer-centric
communication
networked
control
methods,
such
as
inter-vehicle,
vehicle-to-roadside
(V2R),
vehicle-to-vehicle
(V2V)
through
use
vehicular
ad
hoc
networks
(VANETs)
cover
all
aspects
transportation-based
information.
In
existing
systems,
once
devices
are
registered
with
a
Trusted
Authority
(TA),
subsequent
authentication
still
relies
on
TA's
assistance.
However,
these
typically
remain
stationary,
frequent
interaction
TA
becomes
impractical
costly
in
highly
mobile
VANET
environments.
To
address
this
challenge,
we
propose
secure
access
protocol
conditional
privacy
for
VANETs.
Unlike
other
protocols,
our
does
not
require
involvement
during
between
vehicles
RSUs.
Additionally,
leverages
pseudonym
mechanisms
provide
privacy,
enabling
legitimate
anonymous
while
malicious
ones
can
be
tracked.
Our
proposed
scheme
is
supported
by
both
formal
informal
security
analyses
has
been
shown
against
known
attacks
Furthermore,
compared
relevant
studies,
achieves
30.2505%
efficiency
terms
computation
cost
11.09276%
cost,
respectively.
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(07), P. 167 - 178
Published: April 5, 2023
The
highest
way
to
protect
data
from
intruder
and
unauthorized
persons
has
become
a
major
issue.
This
matter
led
the
development
of
many
techniques
for
security,
such
as
Steganography,
Cryptography,
Watermarking
disguise
data.
paper
proposes
an
image
steganography
method
using
Least
Significant
Bits
(LSB)
technique
XOR
operator
secret
key,
through
which
key
is
transformed
into
one-dimensional
bit
stream
array,
then
these
bits
are
XORed
with
image.
Multiple
experiments
have
been
performed
embed
color
grayscale
images
inside
cover
media.
In
this
work,
LSB
ideal
in
two
ways:
firstly,
only
least
significant
one-bit
(1bit)
each
byte
will
store
embedded
data,
named
(1-LSB).
Secondly,
four
right
half-byte
(4
bits)
(4-LSB).
Subjective
objective
analyzes
were
process.
subjective
analysis
responsible
both
HVS
histogram,
whereas
involved
PSNR
MSE
metrics.
International Journal of Emerging Technologies in Learning (iJET),
Journal Year:
2023,
Volume and Issue:
18(06), P. 42 - 52
Published: March 21, 2023
—
To
identify
the
effect
of
deep
learning
strategy
on
mathematics
achievement
and
practical
intelligence
among
secondary
school
students
during
2022/2023
academic
year.
In
research,
experimental
research
method
with
two
groups
(experimental
control)
a
post-test
were
adopted.
The
community
is
represented
by
female
fifth
scientific
grade
from
first
Karkh
Education
Directorate.
(61)
intentionally
chosen,
they
divided
into
groups:
an
group
(30)
who
taught
according
to
proposed
strategy,
control
(31)
usual
method.
For
purpose
collecting
data
for
experiment,
test
was
built,
which
in
its
final
form
(25)
items
out
(20)
objective
type
both
them.
Based
findings,
studied
strategies
outperformed
those
traditional.
International Journal of Emerging Technologies in Learning (iJET),
Journal Year:
2023,
Volume and Issue:
18(07), P. 103 - 115
Published: April 5, 2023
The
aim
of
the
research
is
to
identify
effect
a
scenario-based
learning
in
mathematics
achievement
and
mental
motivation
for
fifth
-
scientific
grade
students
high
school.
To
achieve
it,
researchers
adopted
experimental
method
with
two
groups
(experimental
control)
post-test.
community
was
identified,
which
represents
from
first
Karkh
Education
Directorate.
sample
(60)
were
chosen
intentionally,
divided
into
groups:
an
group
that
studied
according
model;
control
usual
method.
For
purpose
collecting
data
experiment,
test
built,
its
final
form,
consisting
(10)
items
type
essay,
scale,
items.
Appropriate
statistical
analyzes
conducted,
psychometric
properties
scale
confirmed.
results
indicated
who
model
outperformed
traditional
In
this
report,
we
explore
the
key
challenges
and
threats
facing
network
security
in
wired
wireless
environments,
as
well
technologies
best
practices
for
addressing
these
challenges.
We
provide
an
overview
of
concepts
terminology
related
to
security,
trust,
privacy,
discuss
role
encryption
maintaining
trust
privacy
environments.
also
examine
common
attack
vectors
countermeasures
offer
some
recommendations
realm
security.
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(07), P. 69 - 81
Published: April 5, 2023
User
confidentiality
protection
is
concerning
a
topic
in
control
and
monitoring
spaces.
In
image,
user's
faces
security
with
compound
information,
abused
situations,
participation
on
global
transmission
media
real-world
experiences
are
extremely
significant.
For
minifying
the
counting
needs
for
vast
size
of
image
info
time
needful
to
be
address
computationally.
consequently,
partial
encryption
user-face
picked.
This
study
focuses
large
technique
that
designed
encrypt
face
slightly.
Primarily,
dlib
utilizing
detection.
Susan
one
top
edge
detectors
valuable
localization
characteristics
marked
edges,
used
extract
features
vectors
from
user
faces.
Moreover,
relevance
suggested
generating
key
led
crucial
role
improvement
by
producing
them
as
difficult
intruders.
According
PSNR
values,
recommended
algorithms
provided
an
adequate
outcome
encryption,
they
had
lower
encrypting
duration
larger
impact.
International Journal of Emerging Technologies in Learning (iJET),
Journal Year:
2023,
Volume and Issue:
18(09), P. 203 - 215
Published: May 10, 2023
To
identify
the
impact
of
cognitive
modeling
in
mathematics
achievement,
creative
intelligence
for
secondary
school
students
during
2022/2023
academic
year.
achieve
aim
research,
researchers
adopted
experimental
research
method
with
two
groups
(experimental;
control)
a
post-test.
Community
was
identified,
which
represented
by
second
intermediate
grade
/first
KED.
(70)
male
were
intentionally
chosen
as
sample
study,
and
they
divided
into
groups:
an
who
taught
according
to
modeling,
other
control
group
studied
usual
method.
Equivalence
made
between
chronological
age,
level
intelligence,
previous
achievement
mathematics.
For
purpose
collecting
data
experiment,
test
built
its
final
form
(20)
also
out
(25)
paragraph
from
thematic
type
both
them.
Appropriate
statistical
analyzes
carried
out,
besides
done
making
sure
psychometric
properties
tests.
Based
on
findings,
excelled
over
those
traditional.
Wasit Journal of Computer and Mathematics Science,
Journal Year:
2023,
Volume and Issue:
2(1), P. 25 - 29
Published: March 30, 2023
This
article
provides
an
overview
of
steganography
and
its
use
for
hiding
images
in
other
images.
Steganography
is
a
technique
that
allows
users
to
hide
information
plain
sight,
making
it
difficult
unauthorized
parties
detect
or
access
the
information.
Spatial
domain
popular
within
images,
where
least
significant
bits
cover
image
are
modified
embed
secret
image.
The
discusses
advantages
various
applications
such
as
digital
watermarking
secure
communication.
also
techniques
used
spatial
steganography,
how
these
can
be
implemented
using
programming
languages
Python.
Finally,
concludes
by
emphasizing
importance
responsibly
ethically.