Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
25
result(s) for
"Alghazzawi, Daniyal M"
Sort by:
Epileptic Disorder Detection of Seizures Using EEG Signals
by
Tayeb, Haythum O.
,
Alharthi, Mariam K.
,
Moria, Kawthar M.
in
Accuracy
,
Algorithms
,
Brain research
2022
Epilepsy is a nervous system disorder. Encephalography (EEG) is a generally utilized clinical approach for recording electrical activity in the brain. Although there are a number of datasets available, most of them are imbalanced due to the presence of fewer epileptic EEG signals compared with non-epileptic EEG signals. This research aims to study the possibility of integrating local EEG signals from an epilepsy center in King Abdulaziz University hospital into the CHB-MIT dataset by applying a new compatibility framework for data integration. The framework comprises multiple functions, which include dominant channel selection followed by the implementation of a novel algorithm for reading XLtek EEG data. The resulting integrated datasets, which contain selective channels, are tested and evaluated using a deep-learning model of 1D-CNN, Bi-LSTM, and attention. The results achieved up to 96.87% accuracy, 96.98% precision, and 96.85% sensitivity, outperforming the other latest systems that have a larger number of EEG channels.
Journal Article
BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices
by
Alghazzawi, Daniyal M.
,
Cheng, Li
,
Gong, Liangqin
in
Authentication
,
Blockchain
,
Communication
2021
In Internet of Things (IoT) environments, privacy and security are among some of the significant challenges. Recently, several studies have attempted to apply blockchain technology to increase IoT network security. However, the lightweight feature of IoT devices commonly fails to meet computational intensive requirements for blockchain-based security models. In this work, we propose a mechanism to address this issue. We design an IoT blockchain architecture to store device identity information in a distributed ledger. We propose a Blockchain of Things (BCoT) Gateway to facilitate the recording of authentication transactions in a blockchain network without modifying existing device hardware or applications. Furthermore, we introduce a new device recognition model that is suitable for blockchain-based identity authentication, where we employ a novel feature selection method for device traffic flow. Finally, we develop the BCoT Sentry framework as a reference implementation of our proposed method. Experiment results verify the feasibility of our proposed framework.
Journal Article
An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing
by
Hasan, Syed Hamid
,
Hasan, Syed Humaid
,
Bhatia, Surbhi
in
Algorithms
,
Artificial neural networks
,
Automation
2023
Recently, cloud computing resources have become one of the trending technologies that permit the user to manage diverse resources and a huge amount of data in the cloud. Task scheduling is considered one of the most significant challenges and ineffective management results in performance degradation. It is necessary to schedule the task effectively with maximum resource utilization and minimum execution time. Therefore, this paper proposes a novel technique for effective task scheduling with enhanced security in the cloud computing environment. A novel convolutional neural network optimized modified butterfly optimization (CNN-MBO) algorithm is proposed for scheduling the tasks, thereby maximizing the throughput and minimizing the makespan. Secondly, a modified RSA algorithm is employed to encrypt the data, thereby providing secure data transmission. Finally, our proposed approach is simulated under a cloudlet simulator and the evaluation results are analyzed to determine its performance. In addition to this, the proposed approach is compared with various other task scheduling-based approaches for various performance metrics, namely, resource utilization, response time, as well as energy consumption. The experimental results revealed that the proposed approach achieved minimum energy consumption of 180 kWh, a minimum response time of the 20 s, a minimum execution time of 0.43 s, and maximum utilization of 98% for task size 100.
Journal Article
Optimized Generative Adversarial Networks for Adversarial Sample Generation
by
M. Alghazzawi, Daniyal
,
Bhatia, Surbhi
,
Hamid Hasan, Syed
in
Artificial intelligence
,
Communications traffic
,
Cybersecurity
2022
Detecting the anomalous entity in real-time network traffic is a popular area of research in recent times. Very few researches have focused on creating malware that fools the intrusion detection system and this paper focuses on this topic. We are using Deep Convolutional Generative Adversarial Networks (DCGAN) to trick the malware classifier to believe it is a normal entity. In this work, a new dataset is created to fool the Artificial Intelligence (AI) based malware detectors, and it consists of different types of attacks such as Denial of Service (DoS), scan 11, scan 44, botnet, spam, User Datagram Portal (UDP) scan, and ssh scan. The discriminator used in the DCGAN discriminates two different attack classes (anomaly and synthetic) and one normal class. The model collapse, instability, and vanishing gradient issues associated with the DCGAN are overcome using the proposed hybrid Aquila optimizer-based Mine blast harmony search algorithm (AO-MBHS). This algorithm helps the generator to create realistic malware samples to be undetected by the discriminator. The performance of the proposed methodology is evaluated using different performance metrics such as training time, detection rate, F-Score, loss function, Accuracy, False alarm rate, etc. The superiority of the hybrid AO-MBHS based DCGAN model is noticed when the detection rate is changed to 0 after the retraining method to make the defensive technique hard to be noticed by the malware detection system. The support vector machines (SVM) is used as the malicious traffic detection application and its True positive rate (TPR) goes from 80% to 0% after retraining the proposed model which shows the efficiency of the proposed model in hiding the samples.
Journal Article
Designing Interactive Experiences for Children with Cochlear Implant
by
Flórez-Aristizábal, Leandro
,
Alghazzawi, Daniyal
,
Collazos, César
in
Acoustic Stimulation
,
Child
,
children with cochlear implant
2018
Information and Communication Technologies (ICTs) have grown exponentially in the education context and the use of digital products by children is increasing. As a result, teachers are taking advantage of ICTs to include mobile devices such as Tablets or Smartphones inside the classroom as playful support material to motivate children during their learning. Designing an interactive experience for a child with a special need such as a hearing impairment is a great challenge. In this article, two interactive systems are depicted, using a non-traditional interaction, by the following stages: analysis, design and implementation, with the participation of children with cochlear implant in the Institute of Blind and Deaf Children of Valle del Cauca, Colombia and the ASPAS Institute, Mallorca, Spain, who evaluated both interactive systems, PHONOMAGIC and CASETO. Positive results were obtained, showing that the use of real objects can greatly influence the environment in which children interact with the game, allowing them to explore and manipulate the objects supporting their teaching-learning processes.
Journal Article
Optimal Learning Behavior Prediction System Based on Cognitive Style Using Adaptive Optimization-Based Neural Network
by
Alhaddad, Mohammed
,
Hasan, Syed Hamid
,
Malibari, Areej
in
Adaptive systems
,
Algorithms
,
Artificial neural networks
2020
Widespread development of system software, the process of learning, and the excellence in profession of teaching are the formidable challenges faced by the learning behavior prediction system. The learning styles of teachers have different kinds of content designs to enhance their learning. In this learning environment, teachers can work together with the students, but the learning materials are designed by the teachers. The cognitive style deals with mental activities such as learning, remembering, thinking, and the usage of language. Therefore, being motivated by the problems mentioned above, this paper proposes the concept of adaptive optimization-based neural network (AONN). The learning behavior and browsing behavior features are extracted and incorporated into the input of artificial neural network (ANN). Hence, in this paper, the neural network weights are optimized with the use of grey wolf optimizer (GWO) algorithm. The output operation of e-learning with teaching equipment is chosen based on the cognitive style predicted by AONN. In experimental section, the measures of accuracy, sensitivity, specificity, time (sec), and memory (bytes) are carried out. Each of the measure is compared with the proposed AONN and existing fuzzy logic methodologies. Ultimately, the proposed AONN method produces higher accuracy, specificity, and sensitivity results. The results demonstrate that the algorithm proposed in this study can automatically learn network structures competitively, unlike those achieved for neural networks through standard approaches.
Journal Article
An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography
by
M. Alghazzawi, Daniyal
,
Bhatia, Surbhi
,
Hamid Hasan, Syed
in
Algorithms
,
Artificial neural networks
,
Datasets
2022
The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model optimized using a Gradient-based Optimization (GBO)(ICNN-GBO) algorithm. In the ICNN-GBO model, we are injecting the triggers via a steganography and regularization technique. We are generating triggers using a single-pixel, irregular shape, and different sizes. The performance of the proposed methodology is evaluated using different performance metrics such as Attack success rate, stealthiness, pollution index, anomaly index, entropy index, and functionality. When the CNN-GBO model is trained with the poisoned dataset, it will map the malicious code to the target label. The proposed scheme's effectiveness is verified by the experiments conducted on both the benchmark datasets namely CIDAR-10 and MSCELEB 1M dataset. The results demonstrate that the proposed methodology offers significant defense against the conventional backdoor attack detection frameworks such as STRIP and Neutral cleanse.
Journal Article
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
by
Alhaddad, Mohammed
,
Hasan, Syed Hamid
,
Malibari, Areej
in
adaptive tunicate slime mold
,
Cellular telephones
,
cloud storage
2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach utilizes an adaptive tunicate slime-mold (ATS) algorithm to generate optimal key value. Thus, the data uploaded in the cloud system are secured with high authentication, data integrity and confidentiality. The study investigation employed a survey consisting of 50 students and the questionnaire was sent to all fifty students. In addition to this, for obtaining secure data transmission in the cloud, various performance measures, namely the encryption time, decryption time and uploading/downloading time were evaluated. The results reveal that the time of both encryption and decryption is less in ATF approach when compared with other techniques.
Journal Article
Using the B/S Model to Design and Implement Online Shopping System for Gulf Brands
2022
Given the increase in online shopping and the prevailing research gap, this study designed and implemented an online shopping system for Gulf brands. It presents an online customization feature-based design and implementation concerning the case of GhazzawiGowns. The study used the B/S model (browser/server) to design and implement an online shopping system for Gulf brands. This system was developed because online shopping is increasing in the Gulf. Users were asked to provide their input concerning the services and website usage. Feedback showed that the developed system could effectively meet customers’ online shopping needs. However, only a few agreed that Gulf brands provided customization. This highlights that very few services are being offered online that give users a choice to customize products. The provided functions and descriptions of the system were user-friendly and provided greater accessibility to address various design issues. However, the webpage needs to be updated to improve offerings and services.
Journal Article
ERF-XGB: Ensemble Random Forest-Based XG Boost for Accurate Prediction and Classification of E-Commerce Product Review
by
Badri, Sahar K.
,
Hasan, Syed Hamid
,
Alquraishee, Anser Ghazal Ali
in
Accuracy
,
Algorithms
,
Computational linguistics
2023
Recently, the concept of e-commerce product review evaluation has become a research topic of significant interest in sentiment analysis. The sentiment polarity estimation of product reviews is a great way to obtain a buyer’s opinion on products. It offers significant advantages for online shopping customers to evaluate the service and product qualities of the purchased products. However, the issues related to polysemy, disambiguation, and word dimension mapping create prediction problems in analyzing online reviews. In order to address such issues and enhance the sentiment polarity classification, this paper proposes a new sentiment analysis model, the Ensemble Random Forest-based XG boost (ERF-XGB) approach, for the accurate binary classification of online e-commerce product review sentiments. Two different Internet Movie Database (IMDB) datasets and the Chinese Emotional Corpus (ChnSentiCorp) dataset are used for estimating online reviews. First, the datasets are preprocessed through tokenization, lemmatization, and stemming operations. The Harris hawk optimization (HHO) algorithm selects two datasets’ corresponding features. Finally, the sentiments from online reviews are classified into positive and negative categories regarding the proposed ERF-XGB approach. Hyperparameter tuning is used to find the optimal parameter values that improve the performance of the proposed ERF-XGB algorithm. The performance of the proposed ERF-XGB approach is analyzed using evaluation indicators, namely accuracy, recall, precision, and F1-score, for different existing approaches. Compared with the existing method, the proposed ERF-XGB approach effectively predicts sentiments of online product reviews with an accuracy rate of about 98.7% for the ChnSentiCorp dataset and 98.2% for the IMDB dataset.
Journal Article