Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
8
result(s) for
"Okey, Ogobuchi"
Sort by:
Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection
by
Daniel Okey, Ogobuchi
,
Umoren Udo, Ekikere
,
Kleinschmidt, João Henrique
in
Algorithms
,
Analysis
,
Artificial intelligence
2023
Recent years have witnessed an in-depth proliferation of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing rate of IoT device usage is associated with rising security risks resulting from malicious network flows during data exchange between the connected devices. Various security threats have shown high adverse effects on the availability, functionality, and usability of the devices among which denial of service (DoS) and distributed denial of service (DDoS), which attempt to exhaust the capacity of the IoT network (gateway), thereby causing failure in the functionality of the system have been more pronounced. Various machine learning and deep learning algorithms have been used to propose intelligent intrusion detection systems (IDS) to mitigate the challenging effects of these network threats. One concern is that although deep learning algorithms have shown good accuracy results on tabular data, not all deep learning algorithms can perform well on tabular datasets, which happen to be the most commonly available format of datasets for machine learning tasks. Again, there is also the challenge of model explainability and feature selection, which affect model performance. In this regard, we propose a model for IDS that uses attentive mechanisms to automatically select salient features from a dataset to train the IDS model and provide explainable results, the TabNet-IDS. We implement the proposed model using the TabNet algorithm based on PyTorch which is a deep-learning framework. The results obtained show that the TabNet architecture can be used on tabular datasets for IoT security to achieve good results comparable to those of neural networks, reaching an accuracy of 97% on CIC-IDS2017, 95% on CSE-CICIDS2018 and 98% on CIC-DDoS2019 datasets.
Journal Article
BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning
by
Zegarra Rodríguez, Demóstenes
,
Rosa, Renata
,
Saadi, Muhammad
in
Accuracy
,
Algorithms
,
Analysis
2022
Following the recent advances in wireless communication leading to increased Internet of Things (IoT) systems, many security threats are currently ravaging IoT systems, causing harm to information. Considering the vast application areas of IoT systems, ensuring that cyberattacks are holistically detected to avoid harm is paramount. Machine learning (ML) algorithms have demonstrated high capacity in helping to mitigate attacks on IoT devices and other edge systems with reasonable accuracy. However, the dynamics of operation of intruders in IoT networks require more improved IDS models capable of detecting multiple attacks with a higher detection rate and lower computational resource requirement, which is one of the challenges of IoT systems. Many ensemble methods have been used with different ML classifiers, including decision trees and random forests, to propose IDS models for IoT environments. The boosting method is one of the approaches used to design an ensemble classifier. This paper proposes an efficient method for detecting cyberattacks and network intrusions based on boosted ML classifiers. Our proposed model is named BoostedEnML. First, we train six different ML classifiers (DT, RF, ET, LGBM, AD, and XGB) and obtain an ensemble using the stacking method and another with a majority voting approach. Two different datasets containing high-profile attacks, including distributed denial of service (DDoS), denial of service (DoS), botnets, infiltration, web attacks, heartbleed, portscan, and botnets, were used to train, evaluate, and test the IDS model. To ensure that we obtained a holistic and efficient model, we performed data balancing with synthetic minority oversampling technique (SMOTE) and adaptive synthetic (ADASYN) techniques; after that, we used stratified K-fold to split the data into training, validation, and testing sets. Based on the best two models, we construct our proposed BoostedEnsML model using LightGBM and XGBoost, as the combination of the two classifiers gives a lightweight yet efficient model, which is part of the target of this research. Experimental results show that BoostedEnsML outperformed existing ensemble models in terms of accuracy, precision, recall, F-score, and area under the curve (AUC), reaching 100% in each case on the selected datasets for multiclass classification.
Journal Article
Correction: Okey et al. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. Sensors 2022, 22, 7409
by
Rosa, Renata Lopes
,
Maidin, Siti Sarah
,
Zegarra Rodríguez, Demóstenes
in
Datasets
,
Machine learning
2025
There was an error in the original publication [...]
Journal Article
An Analysis of Image Features Extracted by CNNs to Design Classification Models for COVID-19 and Non-COVID-19
by
Teodoro, Arthur A. M.
,
Rodríguez, Demóstenes Z.
,
Saadi, Muhammad
in
Algorithms
,
Application programming interface
,
Artificial intelligence
2023
The SARS-CoV-2 virus causes a respiratory disease in humans, known as COVID-19. The confirmatory diagnostic of this disease occurs through the real-time reverse transcription and polymerase chain reaction test (RT-qPCR). However, the period of obtaining the results limits the application of the mass test. Thus, chest X-ray computed tomography (CT) images are analyzed to help diagnose the disease. However, during an outbreak of a disease that causes respiratory problems, radiologists may be overwhelmed with analyzing medical images. In the literature, some studies used feature extraction techniques based on CNNs, with classification models to identify COVID-19 and non-COVID-19. This work compare the performance of applying pre-trained CNNs in conjunction with classification methods based on machine learning algorithms. The main objective is to analyze the impact of the features extracted by CNNs, in the construction of models to classify COVID-19 and non-COVID-19. A SARS-CoV-2 CT data-set is used in experimental tests. The CNNs implemented are visual geometry group (VGG-16 and VGG-19), inception V3 (IV3), and EfficientNet-B0 (EB0). The classification methods were k-nearest neighbor (KNN), support vector machine (SVM), and explainable deep neural networks (xDNN). In the experiments, the best results were obtained by the EfficientNet model used to extract data and the SVM with an RBF kernel. This approach achieved an average performance of 0.9856 in the precision macro, 0.9853 in the sensitivity macro, 0.9853 in the specificity macro, and 0.9853 in the F1 score macro.
Journal Article
Quantum-assisted federated intelligent diagnosis algorithm with variational training supported by 5G networks
by
Rodríguez, Demóstenes Zegarra
,
Rosa, Renata Lopes
,
Adasme, Pablo
in
639/166/987
,
639/705/258
,
Algorithms
2024
In the realm of intelligent healthcare, there is a growing ambition to reshape medical services through the integration of artificial intelligence (AI). However, conventional machine learning faces inherent challenges such as privacy issues, delayed updates, and protracted training times, particularly due to the hesitance of medical institutions to directly share sensitive data, with possible noises. In response to these concerns, a Quantum-Assisted Federated Intelligent Diagnosis Algorithm (
β
-QuAFIDA) is proposed, applied into real medical data. Leveraging the capabilities of the 5G mobile network, this approach works the connection between Internet of Medical Things (IoMT) devices through the 5G, synchronizing training and updating the server model without disrupting their real-world applications. In our quest to safeguard patient data and enhance training efficiency, our study employs an innovative heuristic approach marked by a nested loop structure. Specifically, the inner loop is dedicated to training the beta-variational quantum eigensolver (
β
-VQE) to approximate the expectation values of the proposed algorithm; the outer loop trains the
β
-QuAFIDA to reduce the relative entropy towards the target. This approach involves a balance between privacy considerations and the urgency of training. Results demonstrate that representations with low-rank attained through
β
-QuAFIDA offer an effective approach for acquiring low-rank states. This research signifies a step forward in the synergy between AI and 5G technologies, presenting a novel avenue for the advancement of intelligent healthcare.
Journal Article
Telecommunication Network Performances and Evaluation of Radio Frequency Electromagnetic Radiation: Health Effects of the RF-EMR GSM Base Stations
by
Kazaure, Jazuli
,
Ugochukwu, Matthew
,
Okey, Ogobuchi
in
Accuracy
,
Automobile safety
,
Cellular communication
2021
The ongoing mobile communication technology intensification had occasioned the inevitable multiplications in the ratio of the radio frequency base service stations which had raised public consciousness over the considerable health hazards of the radioactive emissions from the communication systems. The current paper analysed the sequences of electromagnetic field measurements performed on the selected three states in the North West Nigeria in order to establish the compliance of radiation levels of cellular base stations and wireless fidelity access points with respect to internationally approved recommendations. The measured power densities of wireless fidelity access points are minimal and do not surpass 1% of the level allowed by International Commission on Non-Ionizing Radiation (ICNIRP). The result confirmed the environmental safety of the RF energy maintained by the telecommunication operators within the general public indicating an insignificant health hazards to the citizens.
Journal Article
Business Demand for a Cloud Enterprise Data Warehouse in Electronic Healthcare Computing: Issues and Developments in E-Healthcare Cloud Computing
by
Okochi, Prisca I
,
Matthew, Ani Okechukwu
,
Matthew, Ugochukwu O
in
Cloud computing
,
Health care reform
,
Information management
2022
Cloud enterprise data warehousing is a top level strategic business and information technology (IT) investment initiative in any organization that is technologically inclined, profit driven and customer oriented. To build the data warehouse, data are obtained from numerous heterogenous data sources, transformed, cleansed and processed into an applicable data repositories for implementation across the healthcare organizational settings. The current paper constructed an enterprise cloud data warehouse for e-healthcare organization and connected the medical/clinical workforces through the enterprise e-healthcare data warehouse and allowed the medical solutions and clinical information of all the patient to be stored. The proposed system is expected to improved the e-Healthcare information management by providing a model to support medical software automation, hardware system integration and enhances the control and management of the patients records.
Journal Article
Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks
by
Toor, Waqas Tariq
,
Maidin, Siti Sarah
,
Zegarra Rodríguez, Demóstenes
in
Accuracy
,
Algorithms
,
Analysis
2022
In next-generation networks, including the sixth generation (6G), a large number of computing devices can communicate with ultra-low latency. By implication, 6G capabilities present a massive benefit for the Internet of Things (IoT), considering a wide range of application domains. However, some security concerns in the IoT involving authentication and encryption protocols are currently under investigation. Thus, mechanisms implementing quantum communications in IoT devices have been explored to offer improved security. Algorithmic solutions that enable better quantum key distribution (QKD) selection for authentication and encryption have been developed, but having limited performance considering time requirements. Therefore, a new approach for selecting the best QKD protocol based on a Deep Convolutional Neural Network model, called Tree-CNN, is proposed using the Tanh Exponential Activation Function (TanhExp) that enables IoT devices to handle more secure quantum communications using the 6G network infrastructure. The proposed model is developed, and its performance is compared with classical Convolutional Neural Networks (CNN) and other machine learning methods. The results obtained are superior to the related works, with an Area Under the Curve (AUC) of 99.89% during testing and a time-cost performance of 0.65 s for predicting the best QKD protocol. In addition, we tested our proposal using different transmission distances and three QKD protocols to demonstrate that the prediction and actual results reached similar values. Hence, our proposed model obtained a fast, reliable, and precise solution to solve the challenges of performance and time consumption in selecting the best QKD protocol.
Journal Article