期刊文献+
共找到37篇文章
< 1 2 >
每页显示 20 50 100
Optimization of Cooperative RelayingMolecular Communications for Nanomedical Applications
1
作者 Eman S.Attia Ashraf A.M.Khalaf +4 位作者 Fathi E.Abd El-Samie Saied M.Abd El-atty Konstantinos A.Lizos Osama Alfarraj Heba M.El-Hoseny 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1259-1275,共17页
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus... Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget. 展开更多
关键词 Nanomedical system molecular communication cooperative relay OPTIMIZATION
下载PDF
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection
2
作者 Mostafa Nassar Anas M.Ali +5 位作者 Walid El-Shafai Adel Saleeb Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Hossam Eldin H.Ahmed 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2235-2247,共13页
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using ma... Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using machine learning and deep learning.The significant advantage of deep learning is that it is highly efficient,but it needs a large training time with a lot of data.Therefore,in this paper,we present a new feature reduction strategy based on Distributed Cumulative Histograms(DCH)to distinguish between dataset features to locate the most effective features.Cumulative histograms assess the dataset instance patterns of the applied features to identify the most effective attributes that can significantly impact the classification results.Three different models for detecting attacks using Convolutional Neural Network(CNN)and Long Short-Term Memory Network(LSTM)are also proposed.The accuracy test of attack detection using the hybrid model was 98.96%on the UNSW-NP15 dataset.The proposed model is compared with wrapper-based and filter-based Feature Selection(FS)models.The proposed model reduced classification time and increased detection accuracy. 展开更多
关键词 Feature selection DCH LSTM CNN security systems
下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
3
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
下载PDF
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
4
作者 Samah Alshathri Ayman El-Sayed +1 位作者 Walid El-Shafai Ezz El-Din Hemdan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期819-834,共16页
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters. 展开更多
关键词 ATTACKS intrusion detection machine learning deep learning industrial IoT TON_IoT dataset
下载PDF
Statistical Time Series Forecasting Models for Pandemic Prediction
5
作者 Ahmed ElShafee Walid El-Shafai +2 位作者 Abeer D.Algarni Naglaa F.Soliman Moustafa H.Aly 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期349-374,共26页
COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be... COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be projected using different methodologies.Thus,this work aims to gauge the spread of the outbreak severity over time.Furthermore,data analytics and Machine Learning(ML)techniques are employed to gain a broader understanding of virus infections.We have simulated,adjusted,and fitted several statistical time-series forecasting models,linearML models,and nonlinear ML models.Examples of these models are Logistic Regression,Lasso,Ridge,ElasticNet,Huber Regressor,Lasso Lars,Passive Aggressive Regressor,K-Neighbors Regressor,Decision Tree Regressor,Extra Trees Regressor,Support Vector Regressions(SVR),AdaBoost Regressor,Random Forest Regressor,Bagging Regressor,AuoRegression,MovingAverage,Gradient Boosting Regressor,Autoregressive Moving Average(ARMA),Auto-Regressive Integrated Moving Averages(ARIMA),SimpleExpSmoothing,Exponential Smoothing,Holt-Winters,Simple Moving Average,Weighted Moving Average,Croston,and naive Bayes.Furthermore,our suggested methodology includes the development and evaluation of ensemble models built on top of the best-performing statistical and ML-based prediction methods.A third stage in the proposed system is to examine three different implementations to determine which model delivers the best performance.Then,this best method is used for future forecasts,and consequently,we can collect the most accurate and dependable predictions. 展开更多
关键词 Forecasting COVID-19 predictive models medical viruses mathematical model market research DISEASES
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
6
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
下载PDF
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
7
作者 Lamiaa A.Abou Elazm Walid El-Shafai +6 位作者 Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期929-955,共27页
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the secur... Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of these sys-tems.Biometric systems provide sufficient protection and privacy for users.The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks.In addition,they have not been studied on different and large biometric datasets.Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems.This paper presents a suggested hybrid cancellable biometric recognition system based on a 3D chaotic cryptosystem.The rationale behind the utilization of the 3D chaotic cryptosystem is to guarantee strong encryption of biometric templates,and hence enhance the security and privacy of users.The suggested cryptosystem adds significant permutation and diffusion to the encrypted biometric templates.We introduce some sort of attack analysis in this paper to prove the robustness of the proposed cryptosystem against attacks.In addition,a Field Programmable Gate Array(FPGA)implementation of the pro-posed system is introduced.The obtained results with the proposed cryptosystem are compared with those of the traditional encryption schemes,such as Double Random Phase Encoding(DRPE)to reveal superiority,and hence high recogni-tion performance of the proposed cancellable biometric recognition system.The obtained results prove that the proposed cryptosystem enhances the security and leads to better efficiency of the cancellable biometric recognition system in the presence of different types of attacks. 展开更多
关键词 Information security cancellable biometric recognition systems CRYPTANALYSIS 3D chaotic map ENCRYPTION FPGA
下载PDF
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication ChannelModels
8
作者 Naglaa F.Soliman Fatma E.Fadl-Allah +3 位作者 Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第4期201-241,共41页
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ... The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. 展开更多
关键词 Cybersecurity applications image transmission channel models modulation techniques watermarking and encryption
下载PDF
Design of a Proportional-Integral-Derivative Controller for an Automatic Generation Control of Multi-area Power Thermal Systems Using Firefly Algorithm 被引量:4
9
作者 K.Jagatheesan B.Anand +3 位作者 Sourav Samanta Nilanjan Dey Amira S.Ashour Valentina E.Balas 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第2期503-515,共13页
Essentially, it is significant to supply the consumer with reliable and sufficient power. Since, power quality is measured by the consistency in frequency and power flow between control areas. Thus, in a power system ... Essentially, it is significant to supply the consumer with reliable and sufficient power. Since, power quality is measured by the consistency in frequency and power flow between control areas. Thus, in a power system operation and control,automatic generation control(AGC) plays a crucial role. In this paper, multi-area(Five areas: area 1, area 2, area 3, area 4 and area 5) reheat thermal power systems are considered with proportional-integral-derivative(PID) controller as a supplementary controller. Each area in the investigated power system is equipped with appropriate governor unit, turbine with reheater unit, generator and speed regulator unit. The PID controller parameters are optimized by considering nature bio-inspired firefly algorithm(FFA). The experimental results demonstrated the comparison of the proposed system performance(FFA-PID)with optimized PID controller based genetic algorithm(GAPID) and particle swarm optimization(PSO) technique(PSOPID) for the same investigated power system. The results proved the efficiency of employing the integral time absolute error(ITAE) cost function with one percent step load perturbation(1 % SLP) in area 1. The proposed system based FFA achieved the least settling time compared to using the GA or the PSO algorithms, while, it attained good results with respect to the peak overshoot/undershoot. In addition, the FFA performance is improved with the increased number of iterations which outperformed the other optimization algorithms based controller. 展开更多
关键词 Automatic generation control(AGC) FIREFLY ALGORITHM GENETIC algorithm(GA) particle SWARM optimization(PSO) proportional-integral-derivative(PID) CONTROLLER
下载PDF
Genetic Based Approach for Optimal Power and Channel Allocation to Enhance D2D Underlaied Cellular Network Capacity in 5G
10
作者 Ahmed.A.Rosas Mona Shokair M.I.Dessouky 《Computers, Materials & Continua》 SCIE EI 2022年第8期3751-3762,共12页
With the obvious throughput shortage in traditional cellular radio networks,Device-to-Device(D2D)communications has gained a lot of attention to improve the utilization,capacity and channel performance of nextgenerati... With the obvious throughput shortage in traditional cellular radio networks,Device-to-Device(D2D)communications has gained a lot of attention to improve the utilization,capacity and channel performance of nextgeneration networks.In this paper,we study a joint consideration of power and channel allocation based on genetic algorithm as a promising direction to expand the overall network capacity for D2D underlaied cellular networks.The genetic based algorithm targets allocating more suitable channels to D2D users and finding the optimal transmit powers for all D2D links and cellular users efficiently,aiming to maximize the overall system throughput of D2D underlaied cellular network with minimum interference level,while satisfying the required quality of service QoS of each user.The simulation results show that our proposed approach has an advantage in terms of maximizing the overall system utilization than fixed,random,BAT algorithm(BA)and Particle Swarm Optimization(PSO)based power allocation schemes. 展开更多
关键词 5G D2D communication spectrum allocation power allocation genetic algorithm optimization BAT-optimization particle swarm optimization
下载PDF
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications
11
作者 Hend Ibrahim Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3293-3318,共26页
Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided ... Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided media with light.This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing(OFDM).This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection(IM/DD)system.This system requires a non-negativity constraint.The paper presents a framework for wireless optical OFDM system that comprises(IM/DD)with different forms,Direct Current biased Optical OFDM(DCO-OFDM),Asymmetrically Clipped Optical OFDM(ACO-OFDM),Asymmetrically DC-biased Optical OFDM(ADO-OFDM),and Flip-OFDM.It also considers channel coding as a tool for error control,channel equalization for reducing deterioration due to channel effects,and investigation of the turbulence effects.The evaluation results of the proposed framework reveal enhancement of performance.The performance of the IM/DD-OFDM system is investigated over different channel models such as AWGN,log-normal turbulence channel model,and ceiling bounce channel model.The simulation results show that the BER performance of the IM/DD-OFDM communication system is enhanced while the fading strength is decreased.The results reveal also that Hamming codes,BCH codes,and convolutional codes achieve better BER performance.Also,two algorithms of channel estimation and equalization are considered and compared.These algorithms include the Least Squares(LS)and the Minimum Mean Square Error(MMSE).The simulation results show that the MMSE algorithm gives better BER performance than the LS algorithm. 展开更多
关键词 Optical communication systems OWC IM/DD OFDM MMSE LS ADO-OFDM DCO-OFDM ACO-OFDM
下载PDF
Performance Analysis of an Artificial Intelligence Nanosystem with Biological Internet of Nano Things
12
作者 Saied M.Abd El-atty Nancy A.Arafa +3 位作者 Atef Abouelazm Osama Alfarraj Konstantinos A.Lizos Farid Shawki 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第10期111-131,共21页
Artificial intelligence(AI)has recently been used in nanomedical applications,in which implanted intelligent nanosystems inside the human body were used to diagnose and treat a variety of ailments with the help of the... Artificial intelligence(AI)has recently been used in nanomedical applications,in which implanted intelligent nanosystems inside the human body were used to diagnose and treat a variety of ailments with the help of the Internet of biological Nano Things(IoBNT).Biological circuit engineering or nanomaterial-based architectures can be used to approach the nanosystem.In nanomedical applications,the blood vascular medium serves as a communication channel,demonstrating a molecular communication system based on flow and diffusion.This paper presents a performance study of the channel capacity for flow-based-diffusive molecular communication nanosystems that takes into account the ligand-receptor binding mechanism.Unlike earlier studies,we take into account the effects of biological physical characteristics such as blood pressure,blood viscosity,and vascular diameter on channel capacity.Furthermore,in terms of drug transmission error probability,the inter-symbol interference(ISI)phenomenon is applied to the proposed system.The numerical results show that the proposed AI nanosystems-based IoBNT technology can be successfully implemented in future nanomedicine. 展开更多
关键词 Nanosystem AI Internet of biological Nano Things(IoBNT) channel capacity
下载PDF
Gauss Gradient and SURF Features for Landmine Detection from GPR Images
13
作者 Fatma M.El-Ghamry Walid El-Shafai +6 位作者 Mahmouad I.Abdalla Ghada M.El-Banby Abeer D.Algarni Moawad I.Dessouky Adel S.Elfishawy Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第6期4457-4486,共30页
Recently,ground-penetrating radar(GPR)has been extended as a well-known area to investigate the subsurface objects.However,its output has a low resolution,and it needs more processing for more interpretation.This pape... Recently,ground-penetrating radar(GPR)has been extended as a well-known area to investigate the subsurface objects.However,its output has a low resolution,and it needs more processing for more interpretation.This paper presents two algorithms for landmine detection from GPR images.The first algorithm depends on a multi-scale technique.A Gaussian kernel with a particular scale is convolved with the image,and after that,two gradients are estimated;horizontal and vertical gradients.Then,histogram and cumulative histogram are estimated for the overall gradient image.The bin values on the cumulative histogram are used for discrimination between images with and without landmines.Moreover,a neural classifier is used to classify images with cumulative histograms as feature vectors.The second algorithm is based on scale-space analysis with the number of speeded-up robust feature(SURF)points as the key parameter for classification.In addition,this paper presents a framework for size reduction of GPR images based on decimation for efficient storage.The further classification steps can be performed on images after interpolation.The sensitivity of classification accuracy to the interpolation process is studied in detail. 展开更多
关键词 GPR images cumulative histogram gradient image neural classifier SURF
下载PDF
Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing
14
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +3 位作者 Walid El-Shafai Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第8期3687-3703,共17页
The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four s... The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four stages:biometric data collection and processing,Arnold’s Cat Map encryption,decimation process to reduce the size,and finalmerging of the four biometrics in a single generated template.First,a 2D matrix of size 128×128 is created based on Arnold’s Cat Map(ACM).The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security.The decimation is performed to keep the dimensions of the overall cancellable template similar to those of a single template to avoid data redundancy.Moreover,some sort of aliasing occurs due to decimation,contributing to the intended distortion of biometric templates.The hybrid structure that comprises encryption,decimation,andmerging generates encrypted and distorted cancellable templates.The simulation results obtained for performance evaluation show that the system is safe,reliable,and feasible as it achieves high security in the presence of noise. 展开更多
关键词 Aliasing technique selective encryption ACM decimation process
下载PDF
Secure Cancelable Template Based on Double Random Phase Encoding and Entropy Segmentation
15
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +2 位作者 Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第11期4067-4085,共19页
In this paper,a proposed cancellable biometric scheme is based on multiple biometric image identifiers,Arnold’s cat map and double random phase encoding(DRPE)to obtain cancellable biometric templates.The proposed seg... In this paper,a proposed cancellable biometric scheme is based on multiple biometric image identifiers,Arnold’s cat map and double random phase encoding(DRPE)to obtain cancellable biometric templates.The proposed segmentation scheme that is used to select the region of interest for generating cancelable templates is based on chaos entropy low correlation statistical metrics.The objective of segmentation is to reduce the computational cost and reliability of template creation.The left and right biometric(iris,fingerprint,palm print and face)are divided into non-overlapping blocks of the same dimensions.To define the region of interest(ROI),we select the block with the highest entropy.To shorten the registration process time and achieve a high level of security,we select 25%of the image volume of the biometric data.In addition,the low-cost security requirement lies in the use of selective encryption(SE)technology.The step of selecting the maximum entropy is executed on all biometric blocks.The maximum right and left multi-biometric blocks are arranged in descending order from the entropy perspective and select 50%of each biometric couple and store the single matrix.The obtained matrix is scrambled with a certain number of iterations using Arnold’s Cat Map(ACM).The obtained scrambled matrix is encrypted with the DRPE to generate the cancellable biometric templates,which are further concatenated.The simulation results display better performance of the suggested cancellable biometric system in noise scenarios using the area under the receiver operating characteristic(AROC).The strength of the suggested technique is examined with correlation,irregular deviation,maximum difference and maximum deviation.The recommended proposed approach shows that the ability to distinguish the authentic and imposter biometrics of user seven in different levels of the noise environment. 展开更多
关键词 Image identifier computation segmentation ACM (DRPE)
下载PDF
Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications
16
作者 Samah Alshathri Ezz El-Din Hemdan +1 位作者 Walid El-Shafai Amged Sayed 《Computers, Materials & Continua》 SCIE EI 2023年第4期183-196,共14页
In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and ... In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and Industrial Internet of Things (IIoT). The main concept of the DT isto provide a comprehensive tangible, and operational explanation of anyelement, asset, or system. However, it is an extremely dynamic taxonomydeveloping in complexity during the life cycle that produces a massive amountof engendered data and information. Likewise, with the development of AI,digital twins can be redefined and could be a crucial approach to aid theInternet of Things (IoT)-based DT applications for transferring the data andvalue onto the Internet with better decision-making. Therefore, this paperintroduces an efficient DT-based fault diagnosis model based on machinelearning (ML) tools. In this framework, the DT model of the machine isconstructed by creating the simulation model. In the proposed framework,the Genetic algorithm (GA) is used for the optimization task to improvethe classification accuracy. Furthermore, we evaluate the proposed faultdiagnosis framework using performance metrics such as precision, accuracy,F-measure, and recall. The proposed framework is comprehensively examinedusing the triplex pump fault diagnosis. The experimental results demonstratedthat the hybrid GA-ML method gives outstanding results compared to MLmethods like LogisticRegression (LR), Na飗e Bayes (NB), and SupportVectorMachine (SVM). The suggested framework achieves the highest accuracyof 95% for the employed hybrid GA-SVM. The proposed framework willeffectively help industrial operators make an appropriate decision concerningthe fault analysis for IIoT applications in the context of Industry 4.0. 展开更多
关键词 Automated fault diagnosis control system ML AI CC IIoT digital twins genetic algorithm GA-ML technique
下载PDF
COVID-19 Classification from X-Ray Images:An Approach to Implement Federated Learning on Decentralized Dataset
17
作者 Ali Akbar Siddique S.M.Umar Talha +3 位作者 M.Aamir Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2023年第5期3883-3901,共19页
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its aftermath.Due to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big quantity.Patients ... The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its aftermath.Due to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big quantity.Patients who test positive for Covid-19 are diagnosed via a nasal PCR test.In comparison,polymerase chain reaction(PCR)findings take a few hours to a few days.The PCR test is expensive,although the government may bear expenses in certain places.Furthermore,subsets of the population resist invasive testing like swabs.Therefore,chest X-rays or Computerized Vomography(CT)scans are preferred in most cases,and more importantly,they are non-invasive,inexpensive,and provide a faster response time.Recent advances in Artificial Intelligence(AI),in combination with state-of-the-art methods,have allowed for the diagnosis of COVID-19 using chest x-rays.This article proposes a method for classifying COVID-19 as positive or negative on a decentralized dataset that is based on the Federated learning scheme.In order to build a progressive global COVID-19 classification model,two edge devices are employed to train the model on their respective localized dataset,and a 3-layered custom Convolutional Neural Network(CNN)model is used in the process of training the model,which can be deployed from the server.These two edge devices then communicate their learned parameter and weight to the server,where it aggregates and updates the globalmodel.The proposed model is trained using an image dataset that can be found on Kaggle.There are more than 13,000 X-ray images in Kaggle Database collection,from that collection 9000 images of Normal and COVID-19 positive images are used.Each edge node possesses a different number of images;edge node 1 has 3200 images,while edge node 2 has 5800.There is no association between the datasets of the various nodes that are included in the network.By doing it in this manner,each of the nodes will have access to a separate image collection that has no correlation with each other.The diagnosis of COVID-19 has become considerably more efficient with the installation of the suggested algorithm and dataset,and the findings that we have obtained are quite encouraging. 展开更多
关键词 Artificial intelligence deep learning federated learning COVID-19 decentralized image dataset
下载PDF
Machine Learning-based Inverse Model for Few-Mode Fiber Designs
18
作者 Bhagyalaxmi Behera Gyana Ranjan Patra +1 位作者 Shailendra Kumar Varshney Mihir Narayan Mohanty 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期311-328,共18页
The medium for next-generation communication is considered as fiber for fast,secure communication and switching capability.Mode division and space division multiplexing provide an excellent switching capability with h... The medium for next-generation communication is considered as fiber for fast,secure communication and switching capability.Mode division and space division multiplexing provide an excellent switching capability with high data transmission rate.In this work,the authors have approached an inverse modeling technique using regression-based machine learning to design a weakly coupled few-mode fiber for facilitating mode division multiplexing.The technique is adapted to predict the accurate profile parameters for the proposed few-mode fiber to obtain the maximum number of modes.It is for a three-ring-core few-mode fiber for guiding five,ten,fifteen,and twenty modes.Three types of regression models namely ordinary least-square linear multi-output regression,k-nearest neighbors of multi-output regression,and ID3 algorithm-based decision trees for multi-output regression are used for predicting the multiple profile parameters.It is observed that the ID3-based decision tree for multioutput regression is the robust,highly-accurate machine learning model for fast modeling of FMFs.The proposed fiber claims to be an efficient candidate for the next-generation 5G and 6G backhaul networks using mode division multiplexing. 展开更多
关键词 Few-mode fibers inverse modeling machine learning regression ring-core
下载PDF
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
19
作者 Walid El-Shafai Fatma Khallaf +2 位作者 El-Sayed M.El-Rabaie Fathi E.Abd El-Samie Iman Almomani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3599-3618,共20页
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre... This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works. 展开更多
关键词 Medical images DNA encryption digital image watermarking FUSION healthcare applications
下载PDF
An Efficient Medical Image Deep Fusion Model Based on Convolutional Neural Networks
20
作者 Walid El-Shafai Noha A.El-Hag +5 位作者 Ahmed Sedik Ghada Elbanby Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Mohammed E.Abdel Samea 《Computers, Materials & Continua》 SCIE EI 2023年第2期2905-2925,共21页
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis app... Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis applications.This paper proposes a deep learning model for the medical image fusion process.This model depends on Convolutional Neural Network(CNN).The basic idea of the proposed model is to extract features from both CT and MR images.Then,an additional process is executed on the extracted features.After that,the fused feature map is reconstructed to obtain the resulting fused image.Finally,the quality of the resulting fused image is enhanced by various enhancement techniques such as Histogram Matching(HM),Histogram Equalization(HE),fuzzy technique,fuzzy type,and Contrast Limited Histogram Equalization(CLAHE).The performance of the proposed fusion-based CNN model is measured by various metrics of the fusion and enhancement quality.Different realistic datasets of different modalities and diseases are tested and implemented.Also,real datasets are tested in the simulation analysis. 展开更多
关键词 Image fusion CNN deep learning feature extraction evaluation metrics medical diagnosis
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部