期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models 被引量:1
1
作者 Naglaa F.Soliman Fatma E.Fadl-Allah +3 位作者 Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第4期201-241,共41页
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ... The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. 展开更多
关键词 Cybersecurity applications image transmission channel models modulation techniques watermarking and encryption
在线阅读 下载PDF
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
2
作者 Samah Alshathri Ayman El-Sayed +1 位作者 Walid El-Shafai Ezz El-Din Hemdan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期819-834,共16页
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters. 展开更多
关键词 ATTACKS intrusion detection machine learning deep learning industrial IoT TON_IoT dataset
在线阅读 下载PDF
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
3
作者 Walid El-Shafai Fatma Khallaf +2 位作者 El-Sayed M.El-Rabaie Fathi E.Abd El-Samie Iman Almomani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3599-3618,共20页
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre... This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works. 展开更多
关键词 Medical images DNA encryption digital image watermarking FUSION healthcare applications
在线阅读 下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
4
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
在线阅读 下载PDF
Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans
5
作者 Nahed Tawfik Heba M.Emara +3 位作者 Walid El-Shafai Naglaa F.Soliman Abeer D.Algarni Fathi EAbd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第10期271-307,共37页
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a... Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates. 展开更多
关键词 Lung cancer detection CLAHE algorithm optimization deep learning CLASSIFICATION feature extraction healthcare applications
在线阅读 下载PDF
An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications
6
作者 Ghalib H.Alshammri Amani K.Samha +2 位作者 Ezz El-Din Hemdan Mohammed Amoon Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第8期3529-3548,共20页
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process.In recent times,the most complex task in Software Defined Network(SDN)is security,w... Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process.In recent times,the most complex task in Software Defined Network(SDN)is security,which is based on a centralized,programmable controller.Therefore,monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment.Consequently,this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms:K-means,Farthest First,Canopy,Density-based algorithm,and Exception-maximization(EM),using the Waikato Environment for Knowledge Analysis(WEKA)software to compare extensively between these five algorithms.Furthermore,this paper presents an SDN-based intrusion detection system using a deep learning(DL)model with the KDD(Knowledge Discovery in Databases)dataset.First,the utilized dataset is clustered into normal and four major attack categories via the clustering process.Then,a deep learning method is projected for building an efficient SDN-based intrusion detection system.The results provide a comprehensive analysis and a flawless reasonable study of different kinds of attacks incorporated in the KDD dataset.Similarly,the outcomes reveal that the proposed deep learning method provides efficient intrusion detection performance compared to existing techniques.For example,the proposed method achieves a detection accuracy of 94.21%for the examined dataset. 展开更多
关键词 Deep neural network DL WEKA network traffic intrusion and anomaly detection SDN clustering and classification KDD dataset
在线阅读 下载PDF
Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing
7
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +3 位作者 Walid El-Shafai Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第8期3687-3703,共17页
The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four s... The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four stages:biometric data collection and processing,Arnold’s Cat Map encryption,decimation process to reduce the size,and finalmerging of the four biometrics in a single generated template.First,a 2D matrix of size 128×128 is created based on Arnold’s Cat Map(ACM).The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security.The decimation is performed to keep the dimensions of the overall cancellable template similar to those of a single template to avoid data redundancy.Moreover,some sort of aliasing occurs due to decimation,contributing to the intended distortion of biometric templates.The hybrid structure that comprises encryption,decimation,andmerging generates encrypted and distorted cancellable templates.The simulation results obtained for performance evaluation show that the system is safe,reliable,and feasible as it achieves high security in the presence of noise. 展开更多
关键词 Aliasing technique selective encryption ACM decimation process
在线阅读 下载PDF
COVID-19 Classification from X-Ray Images:An Approach to Implement Federated Learning on Decentralized Dataset 被引量:1
8
作者 Ali Akbar Siddique S.M.Umar Talha +3 位作者 M.Aamir Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2023年第5期3883-3901,共19页
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its aftermath.Due to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big quantity.Patients ... The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its aftermath.Due to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big quantity.Patients who test positive for Covid-19 are diagnosed via a nasal PCR test.In comparison,polymerase chain reaction(PCR)findings take a few hours to a few days.The PCR test is expensive,although the government may bear expenses in certain places.Furthermore,subsets of the population resist invasive testing like swabs.Therefore,chest X-rays or Computerized Vomography(CT)scans are preferred in most cases,and more importantly,they are non-invasive,inexpensive,and provide a faster response time.Recent advances in Artificial Intelligence(AI),in combination with state-of-the-art methods,have allowed for the diagnosis of COVID-19 using chest x-rays.This article proposes a method for classifying COVID-19 as positive or negative on a decentralized dataset that is based on the Federated learning scheme.In order to build a progressive global COVID-19 classification model,two edge devices are employed to train the model on their respective localized dataset,and a 3-layered custom Convolutional Neural Network(CNN)model is used in the process of training the model,which can be deployed from the server.These two edge devices then communicate their learned parameter and weight to the server,where it aggregates and updates the globalmodel.The proposed model is trained using an image dataset that can be found on Kaggle.There are more than 13,000 X-ray images in Kaggle Database collection,from that collection 9000 images of Normal and COVID-19 positive images are used.Each edge node possesses a different number of images;edge node 1 has 3200 images,while edge node 2 has 5800.There is no association between the datasets of the various nodes that are included in the network.By doing it in this manner,each of the nodes will have access to a separate image collection that has no correlation with each other.The diagnosis of COVID-19 has become considerably more efficient with the installation of the suggested algorithm and dataset,and the findings that we have obtained are quite encouraging. 展开更多
关键词 Artificial intelligence deep learning federated learning COVID-19 decentralized image dataset
在线阅读 下载PDF
Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications
9
作者 Samah Alshathri Ezz El-Din Hemdan +1 位作者 Walid El-Shafai Amged Sayed 《Computers, Materials & Continua》 SCIE EI 2023年第4期183-196,共14页
In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and ... In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and Industrial Internet of Things (IIoT). The main concept of the DT isto provide a comprehensive tangible, and operational explanation of anyelement, asset, or system. However, it is an extremely dynamic taxonomydeveloping in complexity during the life cycle that produces a massive amountof engendered data and information. Likewise, with the development of AI,digital twins can be redefined and could be a crucial approach to aid theInternet of Things (IoT)-based DT applications for transferring the data andvalue onto the Internet with better decision-making. Therefore, this paperintroduces an efficient DT-based fault diagnosis model based on machinelearning (ML) tools. In this framework, the DT model of the machine isconstructed by creating the simulation model. In the proposed framework,the Genetic algorithm (GA) is used for the optimization task to improvethe classification accuracy. Furthermore, we evaluate the proposed faultdiagnosis framework using performance metrics such as precision, accuracy,F-measure, and recall. The proposed framework is comprehensively examinedusing the triplex pump fault diagnosis. The experimental results demonstratedthat the hybrid GA-ML method gives outstanding results compared to MLmethods like LogisticRegression (LR), Na飗e Bayes (NB), and SupportVectorMachine (SVM). The suggested framework achieves the highest accuracyof 95% for the employed hybrid GA-SVM. The proposed framework willeffectively help industrial operators make an appropriate decision concerningthe fault analysis for IIoT applications in the context of Industry 4.0. 展开更多
关键词 Automated fault diagnosis control system ML AI CC IIoT digital twins genetic algorithm GA-ML technique
在线阅读 下载PDF
Statistical Time Series Forecasting Models for Pandemic Prediction
10
作者 Ahmed ElShafee Walid El-Shafai +2 位作者 Abeer D.Algarni Naglaa F.Soliman Moustafa H.Aly 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期349-374,共26页
COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be... COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be projected using different methodologies.Thus,this work aims to gauge the spread of the outbreak severity over time.Furthermore,data analytics and Machine Learning(ML)techniques are employed to gain a broader understanding of virus infections.We have simulated,adjusted,and fitted several statistical time-series forecasting models,linearML models,and nonlinear ML models.Examples of these models are Logistic Regression,Lasso,Ridge,ElasticNet,Huber Regressor,Lasso Lars,Passive Aggressive Regressor,K-Neighbors Regressor,Decision Tree Regressor,Extra Trees Regressor,Support Vector Regressions(SVR),AdaBoost Regressor,Random Forest Regressor,Bagging Regressor,AuoRegression,MovingAverage,Gradient Boosting Regressor,Autoregressive Moving Average(ARMA),Auto-Regressive Integrated Moving Averages(ARIMA),SimpleExpSmoothing,Exponential Smoothing,Holt-Winters,Simple Moving Average,Weighted Moving Average,Croston,and naive Bayes.Furthermore,our suggested methodology includes the development and evaluation of ensemble models built on top of the best-performing statistical and ML-based prediction methods.A third stage in the proposed system is to examine three different implementations to determine which model delivers the best performance.Then,this best method is used for future forecasts,and consequently,we can collect the most accurate and dependable predictions. 展开更多
关键词 Forecasting COVID-19 predictive models medical viruses mathematical model market research DISEASES
在线阅读 下载PDF
Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking
11
作者 Amjad Hussain Zahid Muhammad Junaid Arshad +2 位作者 Musheer Ahmad Naglaa F.Soliman Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2023年第5期3011-3026,共16页
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block ciphers.At the moment,chaotic maps are being created and extensively used to generate these SBoxes as... A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block ciphers.At the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts.In this paper,the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach.The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their workingmakes both of these dynamic in nature.The tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic fort.Values of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique S-Box.Comparative analysis and exploration confirmed that the projected chaoticmap exhibits a significant amount of chaotic complexity.The security assessment in terms of bijectivity,nonlinearity,bits independence,strict avalanche,linear approximation probability,and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several assaults.The proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security applications.The comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security. 展开更多
关键词 Substitution-box chaotic map data security tweaking
在线阅读 下载PDF
Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment
12
作者 Firas Abedi Hayder M.A.Ghanimi +6 位作者 Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Ali Hashim Abbas Zahraa H.Kareem Hussein Muhi Hariz Ahmed Alkhayyat 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期3127-3144,共18页
Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid ... Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid solutions.Besides,unmanned aerial vehicles(UAV)developed a hot research topic in the smart city environment.Despite the benefits of UAVs,security remains a major challenging issue.In addition,deep learning(DL)enabled image classification is useful for several applications such as land cover classification,smart buildings,etc.This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification(MDLS-UAVIC)model in a smart city environment.Themajor purpose of the MDLS-UAVIC algorithm is to securely encrypt the images and classify them into distinct class labels.The proposedMDLS-UAVIC model follows a two-stage process:encryption and image classification.The encryption technique for image encryption effectively encrypts the UAV images.Next,the image classification process involves anXception-based deep convolutional neural network for the feature extraction process.Finally,shuffled shepherd optimization(SSO)with a recurrent neural network(RNN)model is applied for UAV image classification,showing the novelty of the work.The experimental validation of the MDLS-UAVIC approach is tested utilizing a benchmark dataset,and the outcomes are examined in various measures.It achieved a high accuracy of 98%. 展开更多
关键词 Computational intelligence unmanned aerial vehicles deep learning metaheuristics smart city image encryption image classification
在线阅读 下载PDF
Chimp Optimization Algorithm Based Feature Selection with Machine Learning for Medical Data Classification
13
作者 Firas Abedi Hayder M.A.Ghanimi +6 位作者 Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Ali Hashim Abbas Zahraa H.Kareem Hussein Muhi Hariz Ahmed Alkhayyat 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2791-2814,共24页
Datamining plays a crucial role in extractingmeaningful knowledge fromlarge-scale data repositories,such as data warehouses and databases.Association rule mining,a fundamental process in data mining,involves discoveri... Datamining plays a crucial role in extractingmeaningful knowledge fromlarge-scale data repositories,such as data warehouses and databases.Association rule mining,a fundamental process in data mining,involves discovering correlations,patterns,and causal structures within datasets.In the healthcare domain,association rules offer valuable opportunities for building knowledge bases,enabling intelligent diagnoses,and extracting invaluable information rapidly.This paper presents a novel approach called the Machine Learning based Association Rule Mining and Classification for Healthcare Data Management System(MLARMC-HDMS).The MLARMC-HDMS technique integrates classification and association rule mining(ARM)processes.Initially,the chimp optimization algorithm-based feature selection(COAFS)technique is employed within MLARMC-HDMS to select relevant attributes.Inspired by the foraging behavior of chimpanzees,the COA algorithm mimics their search strategy for food.Subsequently,the classification process utilizes stochastic gradient descent with a multilayer perceptron(SGD-MLP)model,while the Apriori algorithm determines attribute relationships.We propose a COA-based feature selection approach for medical data classification using machine learning techniques.This approach involves selecting pertinent features from medical datasets through COA and training machine learning models using the reduced feature set.We evaluate the performance of our approach on various medical datasets employing diverse machine learning classifiers.Experimental results demonstrate that our proposed approach surpasses alternative feature selection methods,achieving higher accuracy and precision rates in medical data classification tasks.The study showcases the effectiveness and efficiency of the COA-based feature selection approach in identifying relevant features,thereby enhancing the diagnosis and treatment of various diseases.To provide further validation,we conduct detailed experiments on a benchmark medical dataset,revealing the superiority of the MLARMCHDMS model over other methods,with a maximum accuracy of 99.75%.Therefore,this research contributes to the advancement of feature selection techniques in medical data classification and highlights the potential for improving healthcare outcomes through accurate and efficient data analysis.The presented MLARMC-HDMS framework and COA-based feature selection approach offer valuable insights for researchers and practitioners working in the field of healthcare data mining and machine learning. 展开更多
关键词 Association rule mining data classification healthcare data machine learning parameter tuning data mining feature selection MLARMC-HDMS COA stochastic gradient descent Apriori algorithm
在线阅读 下载PDF
Novel Ransomware Hiding Model Using HEVC Steganography Approach
14
作者 Iman Almomani Aala AlKhayer Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第1期1209-1228,共20页
Ransomware is considered one of the most threatening cyberattacks.Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding r... Ransomware is considered one of the most threatening cyberattacks.Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed.Therefore,this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding(HEVC)steganography approach.The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks.After that,the Least Significant Bit(LSB)based Hamming Distance(HD)calculation is performed amongst the secret data’s divided blocks and cover frames.Finally,the secret data bits are hidden into the marked bits of the cover HEVC frame-blocks based on the calculated HD value.The main advantage of the suggested steganography approach is the minor impact on the cover HEVC frames after embedding the ransomware while preserving the histogram attributes of the cover video frame with a high imperceptibility.This is due to the utilization of an adaptive steganography cost function during the embedding process.The proposed ransomware hiding approach was heavily examined using subjective and objective tests and applying different HEVC streams with diverse resolutions and different secret ransomware apps of various sizes.The obtained results prove the efficiency of the proposed steganography approach by achieving high capacity and successful embedding process while ensuring the hidden ransomware’s undetectability within the video frames.For example,in terms of embedding quality,the proposed model achieved a high peak signal-to-noise ratio that reached 59.3 dB and a low mean-square-error of 0.07 for the examined HEVC streams.Also,out of 65 antivirus engines,no engine could detect the existence of the embedded ransomware app. 展开更多
关键词 Ransomware embedding steganography HEVC LSB hamming distance applications apk stego security confidentiality
在线阅读 下载PDF
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications
15
作者 Hend Ibrahim Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3293-3318,共26页
Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided ... Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided media with light.This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing(OFDM).This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection(IM/DD)system.This system requires a non-negativity constraint.The paper presents a framework for wireless optical OFDM system that comprises(IM/DD)with different forms,Direct Current biased Optical OFDM(DCO-OFDM),Asymmetrically Clipped Optical OFDM(ACO-OFDM),Asymmetrically DC-biased Optical OFDM(ADO-OFDM),and Flip-OFDM.It also considers channel coding as a tool for error control,channel equalization for reducing deterioration due to channel effects,and investigation of the turbulence effects.The evaluation results of the proposed framework reveal enhancement of performance.The performance of the IM/DD-OFDM system is investigated over different channel models such as AWGN,log-normal turbulence channel model,and ceiling bounce channel model.The simulation results show that the BER performance of the IM/DD-OFDM communication system is enhanced while the fading strength is decreased.The results reveal also that Hamming codes,BCH codes,and convolutional codes achieve better BER performance.Also,two algorithms of channel estimation and equalization are considered and compared.These algorithms include the Least Squares(LS)and the Minimum Mean Square Error(MMSE).The simulation results show that the MMSE algorithm gives better BER performance than the LS algorithm. 展开更多
关键词 Optical communication systems OWC IM/DD OFDM MMSE LS ADO-OFDM DCO-OFDM ACO-OFDM
在线阅读 下载PDF
Non-Invasive Early Diagnosis of Obstructive Lung Diseases Leveraging Machine Learning Algorithms
16
作者 Mujeeb Ur Rehman Maha Driss +1 位作者 Abdukodir Khakimov Sohail Khalid 《Computers, Materials & Continua》 SCIE EI 2022年第9期5681-5697,共17页
Lungs are a vital human body organ,and different Obstructive Lung Diseases(OLD)such as asthma,bronchitis,or lung cancer are caused by shortcomings within the lungs.Therefore,early diagnosis of OLD is crucial for such ... Lungs are a vital human body organ,and different Obstructive Lung Diseases(OLD)such as asthma,bronchitis,or lung cancer are caused by shortcomings within the lungs.Therefore,early diagnosis of OLD is crucial for such patients suffering from OLD since,after early diagnosis,breathing exercises and medical precautions can effectively improve their health state.A secure non-invasive early diagnosis of OLD is a primordial need,and in this context,digital image processing supported by Artificial Intelligence(AI)techniques is reliable and widely used in the medical field,especially for improving early disease diagnosis.Hence,this article presents an AIbased non-invasive and secured diagnosis for OLD using physiological and iris features.This research work implements different machine-learning-based techniques which classify various subjects,which are healthy and effective patients.The iris features include gray-level run-length matrix-based features,gray-level co-occurrence matrix,and statistical features.These features are extracted from iris images.Additionally,ten different classifiers and voting techniques,including hard and soft voting,are implemented and tested,and their performances are evaluated using several parameters,which are precision,accuracy,specificity,F-score,and sensitivity.Based on the statistical analysis,it is concluded that the proposed approach offers promising techniques for the non-invasive early diagnosis of OLD with an accuracy of 97.6%. 展开更多
关键词 Obstructive lung disease non-invasive diagnosis machine learning physiological features voting techniques
在线阅读 下载PDF
Efficient Deep CNN Model for COVID-19 Classification
17
作者 Walid El-Shafai Amira A.Mahmoud +5 位作者 El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Mohammed Abd-Elnaby Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2022年第3期4373-4391,共19页
Coronavirus(COVID-19)infection was initially acknowledged as a global pandemic in Wuhan in China.World Health Organization(WHO)stated that the COVID-19 is an epidemic that causes a 3.4%death rate.Chest X-Ray(CXR)and C... Coronavirus(COVID-19)infection was initially acknowledged as a global pandemic in Wuhan in China.World Health Organization(WHO)stated that the COVID-19 is an epidemic that causes a 3.4%death rate.Chest X-Ray(CXR)and Computerized Tomography(CT)screening of infected persons are essential in diagnosis applications.There are numerous ways to identify positive COVID-19 cases.One of the fundamental ways is radiology imaging through CXR,or CT images.The comparison of CT and CXR scans revealed that CT scans are more effective in the diagnosis process due to their high quality.Hence,automated classification techniques are required to facilitate the diagnosis process.Deep Learning(DL)is an effective tool that can be utilized for detection and classification this type of medical images.The deep Convolutional Neural Networks(CNNs)can learn and extract essential features from different medical image datasets.In this paper,a CNN architecture for automated COVID-19 detection from CXR and CT images is offered.Three activation functions as well as three optimizers are tested and compared for this task.The proposed architecture is built from scratch and the COVID-19 image datasets are directly fed to train it.The performance is tested and investigated on the CT and CXR datasets.Three activation functions:Tanh,Sigmoid,and ReLU are compared using a constant learning rate and different batch sizes.Different optimizers are studied with different batch sizes and a constant learning rate.Finally,a comparison between different combinations of activation functions and optimizers is presented,and the optimal configuration is determined.Hence,the main objective is to improve the detection accuracy of COVID-19 from CXR and CT images using DL by employing CNNs to classify medical COVID-19 images in an early stage.The proposed model achieves a classification accuracy of 91.67%on CXR image dataset,and a classification accuracy of 100%on CT dataset with training times of 58 min and 46 min on CXR and CT datasets,respectively.The best results are obtained using the ReLU activation function combined with the SGDM optimizer at a learning rate of 10−5 and a minibatch size of 16. 展开更多
关键词 COVID-19 image classification CNN DL activation functions optimizers
在线阅读 下载PDF
Efficient Forgery Detection Approaches for Digital Color Images
18
作者 Amira Baumy Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3257-3276,共20页
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data... This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively. 展开更多
关键词 Image forgery splicing algorithm copy-move algorithm histogram matching homomorphic enhancement SISR SURF
在线阅读 下载PDF
Hybrid Single Image Super-Resolution Algorithm for Medical Images
19
作者 Walid El-Shafai Ehab Mahmoud Mohamed +2 位作者 Medien Zeghid Anas MAli Moustafa H.Aly 《Computers, Materials & Continua》 SCIE EI 2022年第9期4879-4896,共18页
High-quality medical microscopic images used for diseases detection are expensive and difficult to store.Therefore,low-resolution images are favorable due to their low storage space and ease of sharing,where the image... High-quality medical microscopic images used for diseases detection are expensive and difficult to store.Therefore,low-resolution images are favorable due to their low storage space and ease of sharing,where the images can be enlarged when needed using Super-Resolution(SR)techniques.However,it is important to maintain the shape and size of the medical images while enlarging them.One of the problems facing SR is that the performance of medical image diagnosis is very poor due to the deterioration of the reconstructed image resolution.Consequently,this paper suggests a multi-SR and classification framework based on Generative Adversarial Network(GAN)to generate high-resolution images with higher quality and finer details to reduce blurring.The proposed framework comprises five GAN models:Enhanced SR Generative Adversarial Networks(ESRGAN),Enhanced deep SR GAN(EDSRGAN),Sub-Pixel-GAN,SRGAN,and Efficient Wider Activation-B GAN(WDSR-b-GAN).To train the proposed models,we have employed images from the famous BreakHis dataset and enlarged them by 4×and 16×upscale factors with the ground truth of the size of 256×256×3.Moreover,several evaluation metrics like Peak Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index(SSIM),Multiscale Structural Similarity Index(MS-SSIM),and histogram are applied to make comprehensive and objective comparisons to determine the best methods in terms of efficiency,training time,and storage space.The obtained results reveal the superiority of the proposed models over traditional and benchmark models in terms of color and texture restoration and detection by achieving an accuracy of 99.7433%. 展开更多
关键词 GAN medical images SSIM MS-SSIM PSNR SISR
在线阅读 下载PDF
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
20
作者 Fatma KHALLAF Walid EL-SHAFAI +2 位作者 El-Sayed M.EL-RABAIE Naglaa F.SOLIMAN Fathi EAbd E.L-SAMIE 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第7期1045-1061,共17页
Quaternion algebra has been used to apply the fractional Fourier transform(FrFT)to color images in a comprehensive approach.However,the discrete fractional random transform(DFRNT)with adequate basic randomness remains... Quaternion algebra has been used to apply the fractional Fourier transform(FrFT)to color images in a comprehensive approach.However,the discrete fractional random transform(DFRNT)with adequate basic randomness remains to be examined.This paper presents a novel multistage privacy system for color medical images based on discrete quaternion fractional Fourier transform(DQFrFT)watermarking and three-dimensional chaotic logistic map(3D-CLM)encryption.First,we describe quaternion DFRNT(QDFRNT),which generalizes DFRNT to handle quaternion signals effectively,and then use QDFRNT to perform color medical image adaptive watermarking.To efficiently evaluate QDFRNT,this study derives the relationship between the QDFRNT of a quaternion signal and the four components of the DFRNT signal.Moreover,it uses the human vision system's(HVS)masking qualities of edge,texture,and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the color medical image using the QDFRNT-based adaptive watermarking and support vector machine(SVM)techniques.The limitations of watermark embedding are also explained to conserve watermarking energy.Second,3D-CLM encryption is employed to improve the system's security and efficiency,allowing it to be used as a multistage privacy system.The proposed security system is effective against many types of channel noise attacks,according to simulation results. 展开更多
关键词 Color medical image QUATERNION Adaptive watermarking ENCRYPTION Fractional transform Three-dimensional chaotic logistic map(3D-CLM)
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部