Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
137
result(s) for
"Alyami, Salem A."
Sort by:
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction
by
Talukder, Md. Alamin
,
Moni, Mohammad Ali
,
Uddin, Md Ashraf
in
Abnormalities
,
Accuracy
,
Applied behavior analysis
2024
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities. Machine Learning (ML)-based behavior analysis within the IDS has considerable potential for detecting dynamic cyber threats, identifying abnormalities, and identifying malicious conduct within the network. However, as the number of data grows, dimension reduction becomes an increasingly difficult task when training ML models. Addressing this, our paper introduces a novel ML-based network intrusion detection model that uses Random Oversampling (RO) to address data imbalance and Stacking Feature Embedding based on clustering results, as well as Principal Component Analysis (PCA) for dimension reduction and is specifically designed for large and imbalanced datasets. This model’s performance is carefully evaluated using three cutting-edge benchmark datasets: UNSW-NB15, CIC-IDS-2017, and CIC-IDS-2018. On the UNSW-NB15 dataset, our trials show that the RF and ET models achieve accuracy rates of 99.59% and 99.95%, respectively. Furthermore, using the CIC-IDS2017 dataset, DT, RF, and ET models reach 99.99% accuracy, while DT and RF models obtain 99.94% accuracy on CIC-IDS2018. These performance results continuously outperform the state-of-art, indicating significant progress in the field of network intrusion detection. This achievement demonstrates the efficacy of the suggested methodology, which can be used practically to accurately monitor and identify network traffic intrusions, thereby blocking possible threats.
Journal Article
An Explainable EEG-Based Human Activity Recognition Model Using Machine-Learning Approach and LIME
by
Hussain, Iqram
,
Hasan, Md Mehedi
,
Boyer, Richard
in
Activities of daily living
,
activity recognition
,
Analysis
2023
Electroencephalography (EEG) is a non-invasive method employed to discern human behaviors by monitoring the neurological responses during cognitive and motor tasks. Machine learning (ML) represents a promising tool for the recognition of human activities (HAR), and eXplainable artificial intelligence (XAI) can elucidate the role of EEG features in ML-based HAR models. The primary objective of this investigation is to investigate the feasibility of an EEG-based ML model for categorizing everyday activities, such as resting, motor, and cognitive tasks, and interpreting models clinically through XAI techniques to explicate the EEG features that contribute the most to different HAR states. The study involved an examination of 75 healthy individuals with no prior diagnosis of neurological disorders. EEG recordings were obtained during the resting state, as well as two motor control states (walking and working tasks), and a cognition state (reading task). Electrodes were placed in specific regions of the brain, including the frontal, central, temporal, and occipital lobes (Fz, C1, C2, T7, T8, Oz). Several ML models were trained using EEG data for activity recognition and LIME (Local Interpretable Model-Agnostic Explanations) was employed for interpreting clinically the most influential EEG spectral features in HAR models. The classification results of the HAR models, particularly the Random Forest and Gradient Boosting models, demonstrated outstanding performances in distinguishing the analyzed human activities. The ML models exhibited alignment with EEG spectral bands in the recognition of human activity, a finding supported by the XAI explanations. To sum up, incorporating eXplainable Artificial Intelligence (XAI) into Human Activity Recognition (HAR) studies may improve activity monitoring for patient recovery, motor imagery, the healthcare metaverse, and clinical virtual reality settings.
Journal Article
Designing a multi-epitope vaccine candidate to combat MERS-CoV by employing an immunoinformatics approach
by
Mahmud, Shafi
,
Shimu, Mst. Sharmin Sultana
,
Dhama, Kuldeep
in
631/114
,
631/154
,
Computer applications
2021
Currently, no approved vaccine is available against the Middle East respiratory syndrome coronavirus (MERS-CoV), which causes severe respiratory disease. The spike glycoprotein is typically considered a suitable target for MERS-CoV vaccine candidates. A computational strategy can be used to design an antigenic vaccine against a pathogen. Therefore, we used immunoinformatics and computational approaches to design a multi-epitope vaccine that targets the spike glycoprotein of MERS-CoV. After using numerous immunoinformatics tools and applying several immune filters, a poly-epitope vaccine was constructed comprising cytotoxic T-cell lymphocyte (CTL)-, helper T-cell lymphocyte (HTL)-, and interferon-gamma (IFN-γ)-inducing epitopes. In addition, various physicochemical, allergenic, and antigenic profiles were evaluated to confirm the immunogenicity and safety of the vaccine. Molecular interactions, binding affinities, and the thermodynamic stability of the vaccine were examined through molecular docking and dynamic simulation approaches, during which we identified a stable and strong interaction with Toll-like receptors (TLRs). In silico immune simulations were performed to assess the immune-response triggering capabilities of the vaccine. This computational analysis suggested that the proposed vaccine candidate would be structurally stable and capable of generating an effective immune response to combat viral infections; however, experimental evaluations remain necessary to verify the exact safety and immunogenicity profile of this vaccine.
Journal Article
Role of Inflammatory Cytokines in COVID-19 Patients: A Review on Molecular Mechanisms, Immune Functions, Immunopathology and Immunomodulatory Drugs to Counter Cytokine Storm
by
Rabaan, Ali A.
,
Dhama, Kuldeep
,
Moni, Mohammad Ali
in
Alveoli
,
Anti-inflammatory agents
,
Antiviral agents
2021
Coronavirus disease 2019 (COVID-19), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), is a severe pandemic of the current century. The vicious tentacles of the disease have been disseminated worldwide with unknown complications and repercussions. Advanced COVID-19 syndrome is characterized by the uncontrolled and elevated release of pro-inflammatory cytokines and suppressed immunity, leading to the cytokine storm. The uncontrolled and dysregulated secretion of inflammatory and pro-inflammatory cytokines is positively associated with the severity of the viral infection and mortality rate. The secretion of various pro-inflammatory cytokines such as TNF-α, IL-1, and IL-6 leads to a hyperinflammatory response by recruiting macrophages, T and B cells in the lung alveolar cells. Moreover, it has been hypothesized that immune cells such as macrophages recruit inflammatory monocytes in the alveolar cells and allow the production of large amounts of cytokines in the alveoli, leading to a hyperinflammatory response in severely ill patients with COVID-19. This cascade of events may lead to multiple organ failure, acute respiratory distress, or pneumonia. Although the disease has a higher survival rate than other chronic diseases, the incidence of complications in the geriatric population are considerably high, with more systemic complications. This review sheds light on the pivotal roles played by various inflammatory markers in COVID-19-related complications. Different molecular pathways, such as the activation of JAK and JAK/STAT signaling are crucial in the progression of cytokine storm; hence, various mechanisms, immunological pathways, and functions of cytokines and other inflammatory markers have been discussed. A thorough understanding of cytokines’ molecular pathways and their activation procedures will add more insight into understanding immunopathology and designing appropriate drugs, therapies, and control measures to counter COVID-19. Recently, anti-inflammatory drugs and several antiviral drugs have been reported as effective therapeutic drug candidates to control hypercytokinemia or cytokine storm. Hence, the present review also discussed prospective anti-inflammatory and relevant immunomodulatory drugs currently in various trial phases and their possible implications.
Journal Article
Statistical inference for a constant-stress partially accelerated life tests based on progressively hybrid censored samples from inverted Kumaraswamy distribution
by
Yousef, Manal M.
,
Alyami, Salem A.
,
Hashem, Atef F.
in
Accelerated life tests
,
Bayesian analysis
,
Confidence intervals
2022
In this article, we investigate the problem of point and interval estimations under constant-stress partially accelerated life tests. The lifetime of items under use condition is assumed to follow the two-parameter inverted Kumaraswamy distribution. Based on Type-I progressively hybrid censored samples, the maximum likelihood and Bayesian methods are applied to estimate the model parameters as well as the acceleration factor. Under linear exponential, general entropy and squared error loss functions, Bayesian method outcomes are obtained. In addition, interval estimation is achieved by finding approximately confidence intervals for the parameters, as well as credible intervals. To investigate the accuracy of the obtained estimates and to compare the performance of confidence intervals, a Monte Carlo simulation is developed. Finally, a set of real data is analyzed to demonstrate the estimation procedures.
Journal Article
Bayesian and non-bayesian analysis for stress-strength model based on progressively first failure censoring with applications
by
Elbatal, Ibrahim
,
Albalawi, Olayan
,
El-Saeed, Ahmed R.
in
Algorithms
,
Analysis
,
Bayes Theorem
2024
This article examines the estimate of ϑ = P [ T < Q ], using both Bayesian and non-Bayesian methods, utilizing progressively first-failure censored data. Assume that the stress ( T ) and strength ( Q ) are independent random variables that follow the Burr III distribution and the Burr XII distribution, respectively, with a common first-shape parameter. The Bayes estimator and maximum likelihood estimator of ϑ are obtained. The maximum likelihood (ML) estimator is obtained for non-Bayesian estimation, and the accompanying confidence interval is constructed using the delta approach and the asymptotic normality of ML estimators. Through the use of non-informative and gamma informative priors, the Bayes estimator of ϑ under squared error and linear exponential loss functions is produced. It is suggested that Markov chain Monte Carlo techniques be used for Bayesian estimation in order to achieve Bayes estimators and the associated credible intervals. To evaluate the effectiveness of the several estimators created, a Monte Carlo numerical analysis is also carried out. In the end, for illustrative reasons, an algorithmic application to actual data is investigated.
Journal Article
Improved Transfer-Learning-Based Facial Recognition Framework to Detect Autistic Children at an Early Stage
2021
Autism spectrum disorder (ASD) is a complex neuro-developmental disorder that affects social skills, language, speech and communication. Early detection of ASD individuals, especially children, could help to devise and strategize right therapeutic plan at right time. Human faces encode important markers that can be used to identify ASD by analyzing facial features, eye contact, and so on. In this work, an improved transfer-learning-based autism face recognition framework is proposed to identify kids with ASD in the early stages more precisely. Therefore, we have collected face images of children with ASD from the Kaggle data repository, and various machine learning and deep learning classifiers and other transfer-learning-based pre-trained models were applied. We observed that our improved MobileNet-V1 model demonstrates the best accuracy of 90.67% and the lowest 9.33% value of both fall-out and miss rate compared to the other classifiers and pre-trained models. Furthermore, this classifier is used to identify different ASD groups investigating only autism image data using k-means clustering technique. Thus, the improved MobileNet-V1 model showed the highest accuracy (92.10%) for k = 2 autism sub-types. We hope this model will be useful for physicians to detect autistic children more explicitly at the early stage.
Journal Article
Utilizing Bayesian inference in accelerated testing models under constant stress via ordered ranked set sampling and hybrid censoring with practical validation
by
Alotaibi, Naif
,
Alyami, Salem A.
,
Abdelkawy, Mohamed A.
in
639/705/1041
,
639/705/531
,
Accelerated life-testing
2024
This research investigates the application of the ordered ranked set sampling (ORSSA) procedure in constant-stress partially accelerated life-testing (CSPALTE). The study adopts the assumption that the lifespan of a specific item under operational stress follows a half-logistic probability distribution. Through Bayesian estimation methods, it concentrates on estimating the parameters, utilizing both asymmetric loss function and symmetric loss function. Estimations are conducted using ORSSAs and simple random samples, incorporating hybrid censoring of type-I. Real-world data sets are utilized to offer practical context and validate the theoretical discoveries, providing concrete insights into the research findings. Furthermore, a rigorous simulation study, supported by precise numerical calculations, is meticulously conducted to gauge the Bayesian estimation performance across the two distinct sampling methodologies. This research ultimately sheds light on the efficacy of Bayesian estimation techniques under varying sampling strategies, contributing to the broader understanding of reliability analysis in CSPALTE scenarios.
Journal Article
Vulnerability in Deep Transfer Learning Models to Adversarial Fast Gradient Sign Attack for COVID-19 Prediction from Chest Radiography Images
by
Gupta, Debashis
,
Moni, Mohammad Ali
,
Pal, Biprodip
in
adversarial attack
,
Algorithms
,
Architecture
2021
The COVID-19 pandemic requires the rapid isolation of infected patients. Thus, high-sensitivity radiology images could be a key technique to diagnose patients besides the polymerase chain reaction approach. Deep learning algorithms are proposed in several studies to detect COVID-19 symptoms due to the success in chest radiography image classification, cost efficiency, lack of expert radiologists, and the need for faster processing in the pandemic area. Most of the promising algorithms proposed in different studies are based on pre-trained deep learning models. Such open-source models and lack of variation in the radiology image-capturing environment make the diagnosis system vulnerable to adversarial attacks such as fast gradient sign method (FGSM) attack. This study therefore explored the potential vulnerability of pre-trained convolutional neural network algorithms to the FGSM attack in terms of two frequently used models, VGG16 and Inception-v3. Firstly, we developed two transfer learning models for X-ray and CT image-based COVID-19 classification and analyzed the performance extensively in terms of accuracy, precision, recall, and AUC. Secondly, our study illustrates that misclassification can occur with a very minor perturbation magnitude, such as 0.009 and 0.003 for the FGSM attack in these models for X-ray and CT images, respectively, without any effect on the visual perceptibility of the perturbation. In addition, we demonstrated that successful FGSM attack can decrease the classification performance to 16.67% and 55.56% for X-ray images, as well as 36% and 40% in the case of CT images for VGG16 and Inception-v3, respectively, without any human-recognizable perturbation effects in the adversarial images. Finally, we analyzed that correct class probability of any test image which is supposed to be 1, can drop for both considered models and with increased perturbation; it can drop to 0.24 and 0.17 for the VGG16 model in cases of X-ray and CT images, respectively. Thus, despite the need for data sharing and automated diagnosis, practical deployment of such program requires more robustness.
Journal Article
Topp–Leone Modified Weibull Model: Theory and Applications to Medical and Engineering Data
by
Elbatal, Ibrahim
,
Alotaibi, Naif
,
Okasha, Hassan M.
in
Kurtosis
,
maximum likelihood approach
,
Maximum likelihood method
2022
In this article, a four parameter lifetime model called the Topp–Leone modified Weibull distribution is proposed. The suggested distribution can be considered as an alternative to Kumaraswamy Weibull, generalized modified Weibull, extend odd Weibull Lomax, Weibull-Lomax, Marshall-Olkin alpha power extended Weibull and exponentiated generalized alpha power exponential distributions, etc. The suggested model includes the Topp-Leone Weibull, Topp-Leone Linear failure rate, Topp-Leone exponential and Topp-Leone Rayleigh distributions as a special case. Several characteristics of the new suggested model including quantile function, moments, moment generating function, central moments, mean, variance, coefficient of skewness, coefficient of kurtosis, incomplete moments, the mean residual life and the mean inactive time are derived. The probability density function of the Topp–Leone modified Weibull distribution can be right skewed and uni-modal shaped but, the hazard rate function may be decreasing, increasing, J-shaped, U-shaped and bathtub on its parameters. Three different methods of estimation as; maximum likelihood, maximum product spacing and Bayesian methods are used to estimate the model parameters. For illustrative reasons, applications of the Topp–Leone modified Weibull model to four real data sets related to medical and engineering sciences are provided and contrasted with the fit reached by several other well-known distributions.
Journal Article