期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
Optimization of Cooperative RelayingMolecular Communications for Nanomedical Applications
1
作者 Eman S.Attia Ashraf A.M.Khalaf +4 位作者 Fathi E.Abd El-Samie Saied M.Abd El-atty Konstantinos A.Lizos Osama Alfarraj Heba M.El-Hoseny 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1259-1275,共17页
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus... Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget. 展开更多
关键词 Nanomedical system molecular communication cooperative relay OPTIMIZATION
下载PDF
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection 被引量:1
2
作者 Mostafa Nassar Anas M.Ali +5 位作者 Walid El-Shafai Adel Saleeb Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Hossam Eldin H.Ahmed 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2235-2247,共13页
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using ma... Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using machine learning and deep learning.The significant advantage of deep learning is that it is highly efficient,but it needs a large training time with a lot of data.Therefore,in this paper,we present a new feature reduction strategy based on Distributed Cumulative Histograms(DCH)to distinguish between dataset features to locate the most effective features.Cumulative histograms assess the dataset instance patterns of the applied features to identify the most effective attributes that can significantly impact the classification results.Three different models for detecting attacks using Convolutional Neural Network(CNN)and Long Short-Term Memory Network(LSTM)are also proposed.The accuracy test of attack detection using the hybrid model was 98.96%on the UNSW-NP15 dataset.The proposed model is compared with wrapper-based and filter-based Feature Selection(FS)models.The proposed model reduced classification time and increased detection accuracy. 展开更多
关键词 Feature selection DCH LSTM CNN security systems
下载PDF
Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles
3
作者 Kalpesh Jadav Vishal Sorathiya +5 位作者 Walid El-Shafai Torki Altameem Moustafa HAly Vipul Vekariya Kawsar Ahmed Francis MBui 《Computers, Materials & Continua》 SCIE EI 2023年第11期2009-2030,共22页
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking application.The shadow is the source of error for vehicle detection,which causes misclassification of vehic... Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking application.The shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting,vehicle detection,vehicle tracking,and classification.Most of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets,but the process of extracting shadows from moving vehicles in low light of real scenes is difficult.The real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods of poor illumination for shadow extraction of moving vehicles to address the above problem.This paper offers a robust shadow extraction of moving vehicles and its elimination for vehicle tracking.The method is distributed into two phases:In the first phase,we extract foreground regions using a mixture of Gaussian model,and then in the second phase,with the help of the Gamma correction,intensity ratio,negative transformation,and a combination of Gaussian filters,we locate and remove the shadow region from the foreground areas.Compared to the outcomes proposed method with outcomes of an existing method,the suggested method achieves an average true negative rate of above 90%,a shadow detection rate SDR(η%),and a shadow discrimination rate SDR(ξ%)of 80%.Hence,the suggested method is more appropriate for moving shadow detection in real scenes. 展开更多
关键词 Change illuminations ImageJ software intelligent traffic systems mixture of Gaussian model National Institute of Health vehicle tracking
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
4
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
下载PDF
Statistical Time Series Forecasting Models for Pandemic Prediction
5
作者 Ahmed ElShafee Walid El-Shafai +2 位作者 Abeer D.Algarni Naglaa F.Soliman Moustafa H.Aly 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期349-374,共26页
COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be... COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be projected using different methodologies.Thus,this work aims to gauge the spread of the outbreak severity over time.Furthermore,data analytics and Machine Learning(ML)techniques are employed to gain a broader understanding of virus infections.We have simulated,adjusted,and fitted several statistical time-series forecasting models,linearML models,and nonlinear ML models.Examples of these models are Logistic Regression,Lasso,Ridge,ElasticNet,Huber Regressor,Lasso Lars,Passive Aggressive Regressor,K-Neighbors Regressor,Decision Tree Regressor,Extra Trees Regressor,Support Vector Regressions(SVR),AdaBoost Regressor,Random Forest Regressor,Bagging Regressor,AuoRegression,MovingAverage,Gradient Boosting Regressor,Autoregressive Moving Average(ARMA),Auto-Regressive Integrated Moving Averages(ARIMA),SimpleExpSmoothing,Exponential Smoothing,Holt-Winters,Simple Moving Average,Weighted Moving Average,Croston,and naive Bayes.Furthermore,our suggested methodology includes the development and evaluation of ensemble models built on top of the best-performing statistical and ML-based prediction methods.A third stage in the proposed system is to examine three different implementations to determine which model delivers the best performance.Then,this best method is used for future forecasts,and consequently,we can collect the most accurate and dependable predictions. 展开更多
关键词 Forecasting COVID-19 predictive models medical viruses mathematical model market research DISEASES
下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
6
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
下载PDF
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models
7
作者 Naglaa F.Soliman Fatma E.Fadl-Allah +3 位作者 Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第4期201-241,共41页
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ... The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. 展开更多
关键词 Cybersecurity applications image transmission channel models modulation techniques watermarking and encryption
下载PDF
Genetic Based Approach for Optimal Power and Channel Allocation to Enhance D2D Underlaied Cellular Network Capacity in 5G 被引量:1
8
作者 Ahmed.A.Rosas Mona Shokair M.I.Dessouky 《Computers, Materials & Continua》 SCIE EI 2022年第8期3751-3762,共12页
With the obvious throughput shortage in traditional cellular radio networks,Device-to-Device(D2D)communications has gained a lot of attention to improve the utilization,capacity and channel performance of nextgenerati... With the obvious throughput shortage in traditional cellular radio networks,Device-to-Device(D2D)communications has gained a lot of attention to improve the utilization,capacity and channel performance of nextgeneration networks.In this paper,we study a joint consideration of power and channel allocation based on genetic algorithm as a promising direction to expand the overall network capacity for D2D underlaied cellular networks.The genetic based algorithm targets allocating more suitable channels to D2D users and finding the optimal transmit powers for all D2D links and cellular users efficiently,aiming to maximize the overall system throughput of D2D underlaied cellular network with minimum interference level,while satisfying the required quality of service QoS of each user.The simulation results show that our proposed approach has an advantage in terms of maximizing the overall system utilization than fixed,random,BAT algorithm(BA)and Particle Swarm Optimization(PSO)based power allocation schemes. 展开更多
关键词 5G D2D communication spectrum allocation power allocation genetic algorithm optimization BAT-optimization particle swarm optimization
下载PDF
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications
9
作者 Hend Ibrahim Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3293-3318,共26页
Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided ... Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided media with light.This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing(OFDM).This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection(IM/DD)system.This system requires a non-negativity constraint.The paper presents a framework for wireless optical OFDM system that comprises(IM/DD)with different forms,Direct Current biased Optical OFDM(DCO-OFDM),Asymmetrically Clipped Optical OFDM(ACO-OFDM),Asymmetrically DC-biased Optical OFDM(ADO-OFDM),and Flip-OFDM.It also considers channel coding as a tool for error control,channel equalization for reducing deterioration due to channel effects,and investigation of the turbulence effects.The evaluation results of the proposed framework reveal enhancement of performance.The performance of the IM/DD-OFDM system is investigated over different channel models such as AWGN,log-normal turbulence channel model,and ceiling bounce channel model.The simulation results show that the BER performance of the IM/DD-OFDM communication system is enhanced while the fading strength is decreased.The results reveal also that Hamming codes,BCH codes,and convolutional codes achieve better BER performance.Also,two algorithms of channel estimation and equalization are considered and compared.These algorithms include the Least Squares(LS)and the Minimum Mean Square Error(MMSE).The simulation results show that the MMSE algorithm gives better BER performance than the LS algorithm. 展开更多
关键词 Optical communication systems OWC IM/DD OFDM MMSE LS ADO-OFDM DCO-OFDM ACO-OFDM
下载PDF
Gauss Gradient and SURF Features for Landmine Detection from GPR Images
10
作者 Fatma M.El-Ghamry Walid El-Shafai +6 位作者 Mahmouad I.Abdalla Ghada M.El-Banby Abeer D.Algarni Moawad I.Dessouky Adel S.Elfishawy Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第6期4457-4486,共30页
Recently,ground-penetrating radar(GPR)has been extended as a well-known area to investigate the subsurface objects.However,its output has a low resolution,and it needs more processing for more interpretation.This pape... Recently,ground-penetrating radar(GPR)has been extended as a well-known area to investigate the subsurface objects.However,its output has a low resolution,and it needs more processing for more interpretation.This paper presents two algorithms for landmine detection from GPR images.The first algorithm depends on a multi-scale technique.A Gaussian kernel with a particular scale is convolved with the image,and after that,two gradients are estimated;horizontal and vertical gradients.Then,histogram and cumulative histogram are estimated for the overall gradient image.The bin values on the cumulative histogram are used for discrimination between images with and without landmines.Moreover,a neural classifier is used to classify images with cumulative histograms as feature vectors.The second algorithm is based on scale-space analysis with the number of speeded-up robust feature(SURF)points as the key parameter for classification.In addition,this paper presents a framework for size reduction of GPR images based on decimation for efficient storage.The further classification steps can be performed on images after interpolation.The sensitivity of classification accuracy to the interpolation process is studied in detail. 展开更多
关键词 GPR images cumulative histogram gradient image neural classifier SURF
下载PDF
Secure Cancelable Template Based on Double Random Phase Encoding and Entropy Segmentation
11
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +2 位作者 Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第11期4067-4085,共19页
In this paper,a proposed cancellable biometric scheme is based on multiple biometric image identifiers,Arnold’s cat map and double random phase encoding(DRPE)to obtain cancellable biometric templates.The proposed seg... In this paper,a proposed cancellable biometric scheme is based on multiple biometric image identifiers,Arnold’s cat map and double random phase encoding(DRPE)to obtain cancellable biometric templates.The proposed segmentation scheme that is used to select the region of interest for generating cancelable templates is based on chaos entropy low correlation statistical metrics.The objective of segmentation is to reduce the computational cost and reliability of template creation.The left and right biometric(iris,fingerprint,palm print and face)are divided into non-overlapping blocks of the same dimensions.To define the region of interest(ROI),we select the block with the highest entropy.To shorten the registration process time and achieve a high level of security,we select 25%of the image volume of the biometric data.In addition,the low-cost security requirement lies in the use of selective encryption(SE)technology.The step of selecting the maximum entropy is executed on all biometric blocks.The maximum right and left multi-biometric blocks are arranged in descending order from the entropy perspective and select 50%of each biometric couple and store the single matrix.The obtained matrix is scrambled with a certain number of iterations using Arnold’s Cat Map(ACM).The obtained scrambled matrix is encrypted with the DRPE to generate the cancellable biometric templates,which are further concatenated.The simulation results display better performance of the suggested cancellable biometric system in noise scenarios using the area under the receiver operating characteristic(AROC).The strength of the suggested technique is examined with correlation,irregular deviation,maximum difference and maximum deviation.The recommended proposed approach shows that the ability to distinguish the authentic and imposter biometrics of user seven in different levels of the noise environment. 展开更多
关键词 Image identifier computation segmentation ACM (DRPE)
下载PDF
Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing
12
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +3 位作者 Walid El-Shafai Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第8期3687-3703,共17页
The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four s... The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four stages:biometric data collection and processing,Arnold’s Cat Map encryption,decimation process to reduce the size,and finalmerging of the four biometrics in a single generated template.First,a 2D matrix of size 128×128 is created based on Arnold’s Cat Map(ACM).The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security.The decimation is performed to keep the dimensions of the overall cancellable template similar to those of a single template to avoid data redundancy.Moreover,some sort of aliasing occurs due to decimation,contributing to the intended distortion of biometric templates.The hybrid structure that comprises encryption,decimation,andmerging generates encrypted and distorted cancellable templates.The simulation results obtained for performance evaluation show that the system is safe,reliable,and feasible as it achieves high security in the presence of noise. 展开更多
关键词 Aliasing technique selective encryption ACM decimation process
下载PDF
COVID-19 Classification from X-Ray Images:An Approach to Implement Federated Learning on Decentralized Dataset 被引量:1
13
作者 Ali Akbar Siddique S.M.Umar Talha +3 位作者 M.Aamir Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2023年第5期3883-3901,共19页
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its aftermath.Due to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big quantity.Patients ... The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its aftermath.Due to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big quantity.Patients who test positive for Covid-19 are diagnosed via a nasal PCR test.In comparison,polymerase chain reaction(PCR)findings take a few hours to a few days.The PCR test is expensive,although the government may bear expenses in certain places.Furthermore,subsets of the population resist invasive testing like swabs.Therefore,chest X-rays or Computerized Vomography(CT)scans are preferred in most cases,and more importantly,they are non-invasive,inexpensive,and provide a faster response time.Recent advances in Artificial Intelligence(AI),in combination with state-of-the-art methods,have allowed for the diagnosis of COVID-19 using chest x-rays.This article proposes a method for classifying COVID-19 as positive or negative on a decentralized dataset that is based on the Federated learning scheme.In order to build a progressive global COVID-19 classification model,two edge devices are employed to train the model on their respective localized dataset,and a 3-layered custom Convolutional Neural Network(CNN)model is used in the process of training the model,which can be deployed from the server.These two edge devices then communicate their learned parameter and weight to the server,where it aggregates and updates the globalmodel.The proposed model is trained using an image dataset that can be found on Kaggle.There are more than 13,000 X-ray images in Kaggle Database collection,from that collection 9000 images of Normal and COVID-19 positive images are used.Each edge node possesses a different number of images;edge node 1 has 3200 images,while edge node 2 has 5800.There is no association between the datasets of the various nodes that are included in the network.By doing it in this manner,each of the nodes will have access to a separate image collection that has no correlation with each other.The diagnosis of COVID-19 has become considerably more efficient with the installation of the suggested algorithm and dataset,and the findings that we have obtained are quite encouraging. 展开更多
关键词 Artificial intelligence deep learning federated learning COVID-19 decentralized image dataset
下载PDF
An Efficient Medical Image Deep Fusion Model Based on Convolutional Neural Networks 被引量:1
14
作者 Walid El-Shafai Noha A.El-Hag +5 位作者 Ahmed Sedik Ghada Elbanby Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Mohammed E.Abdel Samea 《Computers, Materials & Continua》 SCIE EI 2023年第2期2905-2925,共21页
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis app... Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis applications.This paper proposes a deep learning model for the medical image fusion process.This model depends on Convolutional Neural Network(CNN).The basic idea of the proposed model is to extract features from both CT and MR images.Then,an additional process is executed on the extracted features.After that,the fused feature map is reconstructed to obtain the resulting fused image.Finally,the quality of the resulting fused image is enhanced by various enhancement techniques such as Histogram Matching(HM),Histogram Equalization(HE),fuzzy technique,fuzzy type,and Contrast Limited Histogram Equalization(CLAHE).The performance of the proposed fusion-based CNN model is measured by various metrics of the fusion and enhancement quality.Different realistic datasets of different modalities and diseases are tested and implemented.Also,real datasets are tested in the simulation analysis. 展开更多
关键词 Image fusion CNN deep learning feature extraction evaluation metrics medical diagnosis
下载PDF
Analysis of BrainMRI: AI-Assisted Healthcare Framework for the Smart Cities
15
作者 Walid El-Shafai Randa Ali +3 位作者 Ahmed Sedik Taha El-Sayed Taha Mohammed Abd-Elnaby Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1843-1856,共14页
The use of intelligent machines to work and react like humans is vital in emerging smart cities.Computer-aided analysis of complex and huge MRI(Mag-netic Resonance Imaging)scans is very important in healthcare applica... The use of intelligent machines to work and react like humans is vital in emerging smart cities.Computer-aided analysis of complex and huge MRI(Mag-netic Resonance Imaging)scans is very important in healthcare applications.Among AI(Artificial Intelligence)driven healthcare applications,tumor detection is one of the contemporary researchfields that have become attractive to research-ers.There are several modalities of imaging performed on the brain for the pur-pose of tumor detection.This paper offers a deep learning approach for detecting brain tumors from MR(Magnetic Resonance)images based on changes in the division of the training and testing data and the structure of the CNN(Convolu-tional Neural Network)layers.The proposed approach is carried out on a brain tumor dataset from the National Centre of Image-Guided Therapy,including about 4700 MRI images of ten brain tumor cases with both normal and abnormal states.The dataset is divided into test,and train subsets with a ratio of the training set to the validation set of 70:30.The main contribution of this paper is introdu-cing an optimum deep learning structure of CNN layers.The simulation results are obtained for 50 epochs in the training phase.The simulation results reveal that the optimum CNN architecture consists of four layers. 展开更多
关键词 Healthcare smart cities clinical automation CNN machine learning brain tumor medical diagnosis
下载PDF
Machine Learning-based Inverse Model for Few-Mode Fiber Designs
16
作者 Bhagyalaxmi Behera Gyana Ranjan Patra +1 位作者 Shailendra Kumar Varshney Mihir Narayan Mohanty 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期311-328,共18页
The medium for next-generation communication is considered as fiber for fast,secure communication and switching capability.Mode division and space division multiplexing provide an excellent switching capability with h... The medium for next-generation communication is considered as fiber for fast,secure communication and switching capability.Mode division and space division multiplexing provide an excellent switching capability with high data transmission rate.In this work,the authors have approached an inverse modeling technique using regression-based machine learning to design a weakly coupled few-mode fiber for facilitating mode division multiplexing.The technique is adapted to predict the accurate profile parameters for the proposed few-mode fiber to obtain the maximum number of modes.It is for a three-ring-core few-mode fiber for guiding five,ten,fifteen,and twenty modes.Three types of regression models namely ordinary least-square linear multi-output regression,k-nearest neighbors of multi-output regression,and ID3 algorithm-based decision trees for multi-output regression are used for predicting the multiple profile parameters.It is observed that the ID3-based decision tree for multioutput regression is the robust,highly-accurate machine learning model for fast modeling of FMFs.The proposed fiber claims to be an efficient candidate for the next-generation 5G and 6G backhaul networks using mode division multiplexing. 展开更多
关键词 Few-mode fibers inverse modeling machine learning regression ring-core
下载PDF
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
17
作者 Samah Alshathri Ayman El-Sayed +1 位作者 Walid El-Shafai Ezz El-Din Hemdan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期819-834,共16页
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters. 展开更多
关键词 ATTACKS intrusion detection machine learning deep learning industrial IoT TON_IoT dataset
下载PDF
Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications
18
作者 Samah Alshathri Ezz El-Din Hemdan +1 位作者 Walid El-Shafai Amged Sayed 《Computers, Materials & Continua》 SCIE EI 2023年第4期183-196,共14页
In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and ... In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and Industrial Internet of Things (IIoT). The main concept of the DT isto provide a comprehensive tangible, and operational explanation of anyelement, asset, or system. However, it is an extremely dynamic taxonomydeveloping in complexity during the life cycle that produces a massive amountof engendered data and information. Likewise, with the development of AI,digital twins can be redefined and could be a crucial approach to aid theInternet of Things (IoT)-based DT applications for transferring the data andvalue onto the Internet with better decision-making. Therefore, this paperintroduces an efficient DT-based fault diagnosis model based on machinelearning (ML) tools. In this framework, the DT model of the machine isconstructed by creating the simulation model. In the proposed framework,the Genetic algorithm (GA) is used for the optimization task to improvethe classification accuracy. Furthermore, we evaluate the proposed faultdiagnosis framework using performance metrics such as precision, accuracy,F-measure, and recall. The proposed framework is comprehensively examinedusing the triplex pump fault diagnosis. The experimental results demonstratedthat the hybrid GA-ML method gives outstanding results compared to MLmethods like LogisticRegression (LR), Na飗e Bayes (NB), and SupportVectorMachine (SVM). The suggested framework achieves the highest accuracyof 95% for the employed hybrid GA-SVM. The proposed framework willeffectively help industrial operators make an appropriate decision concerningthe fault analysis for IIoT applications in the context of Industry 4.0. 展开更多
关键词 Automated fault diagnosis control system ML AI CC IIoT digital twins genetic algorithm GA-ML technique
下载PDF
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
19
作者 Walid El-Shafai Fatma Khallaf +2 位作者 El-Sayed M.El-Rabaie Fathi E.Abd El-Samie Iman Almomani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3599-3618,共20页
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre... This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works. 展开更多
关键词 Medical images DNA encryption digital image watermarking FUSION healthcare applications
下载PDF
An Immutable Framework for Smart Healthcare Using Blockchain Technology
20
作者 Faneela Muazzam A.Khan +3 位作者 Suliman A.Alsuhibany Walid El-Shafai Mujeeb Ur Rehman Jawad Ahmad 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期165-179,共15页
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other... The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical records.The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare system.This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated challenges.The proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy manner.The efficacy of the proposed framework is evaluated in the context of service execution time and throughput.The experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters. 展开更多
关键词 Blockchain technology healthcare applications cybersecurity services IoMT DOS EHR
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部