Displaying all 7 publications

Abstract:
Sort:
  1. Abdallah AE, Hamdan M, Gismalla MSM, Ibrahim AO, Aljurayban NS, Nagmeldin W, et al.
    Sensors (Basel), 2023 Feb 28;23(5).
    PMID: 36904866 DOI: 10.3390/s23052663
    Wireless Local Area Networks (WLANs) have become an increasingly popular mode of communication and networking, with a wide range of applications in various fields. However, the increasing popularity of WLANs has also led to an increase in security threats, including denial of service (DoS) attacks. In this study, management-frames-based DoS attacks, in which the attacker floods the network with management frames, are particularly concerning as they can cause widespread disruptions in the network. Attacks known as denial of service (DoS) can target wireless LANs. None of the wireless security mechanisms in use today contemplate defence against them. At the MAC layer, there are multiple vulnerabilities that can be exploited to launch DoS attacks. This paper focuses on designing and developing an artificial neural network (NN) scheme for detecting management-frames-based DoS attacks. The proposed scheme aims to effectively detect fake de-authentication/disassociation frames and improve network performance by avoiding communication interruption caused by such attacks. The proposed NN scheme leverages machine learning techniques to analyse patterns and features in the management frames exchanged between wireless devices. By training the NN, the system can learn to accurately detect potential DoS attacks. This approach offers a more sophisticated and effective solution to the problem of DoS attacks in wireless LANs and has the potential to significantly enhance the security and reliability of these networks. According to the experimental results, the proposed technique exhibits higher effectiveness in detection compared to existing methods, as evidenced by a significantly increased true positive rate and a decreased false positive rate.
  2. Zehra S, Faseeha U, Syed HJ, Samad F, Ibrahim AO, Abulfaraj AW, et al.
    Sensors (Basel), 2023 Jun 05;23(11).
    PMID: 37300067 DOI: 10.3390/s23115340
    Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Moreover, NFV plays a crucial role in sensor and IoT networks by ensuring optimal resource usage and effective network management. However, adopting NFV in these networks also brings security challenges that must promptly and effectively address. This survey paper focuses on exploring the security challenges associated with NFV. It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. The research evaluates the strengths and weaknesses of various machine learning-based algorithms for detecting network-based anomalies in NFV networks. By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems.
  3. Mahmoud Z, Li C, Zappatore M, Solyman A, Alfatemi A, Ibrahim AO, et al.
    PeerJ Comput Sci, 2023;9:e1639.
    PMID: 38077556 DOI: 10.7717/peerj-cs.1639
    The correction of grammatical errors in natural language processing is a crucial task as it aims to enhance the accuracy and intelligibility of written language. However, developing a grammatical error correction (GEC) framework for low-resource languages presents significant challenges due to the lack of available training data. This article proposes a novel GEC framework for low-resource languages, using Arabic as a case study. To generate more training data, we propose a semi-supervised confusion method called the equal distribution of synthetic errors (EDSE), which generates a wide range of parallel training data. Additionally, this article addresses two limitations of the classical seq2seq GEC model, which are unbalanced outputs due to the unidirectional decoder and exposure bias during inference. To overcome these limitations, we apply a knowledge distillation technique from neural machine translation. This method utilizes two decoders, a forward decoder right-to-left and a backward decoder left-to-right, and measures their agreement using Kullback-Leibler divergence as a regularization term. The experimental results on two benchmarks demonstrate that our proposed framework outperforms the Transformer baseline and two widely used bidirectional decoding techniques, namely asynchronous and synchronous bidirectional decoding. Furthermore, the proposed framework reported the highest F1 score, and generating synthetic data using the equal distribution technique for syntactic errors resulted in a significant improvement in performance. These findings demonstrate the effectiveness of the proposed framework for improving grammatical error correction for low-resource languages, particularly for the Arabic language.
  4. Bhardwaj A, Vishnoi A, Bharany S, Abdelmaboud A, Ibrahim AO, Mamoun M, et al.
    PeerJ Comput Sci, 2023;9:e1771.
    PMID: 38192478 DOI: 10.7717/peerj-cs.1771
    The Internet of Things has a bootloader and applications responsible for initializing the device's hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digital signature verification to ensure that only authorized firmware can be loaded onto the device. Additionally, implementing secure boot processes, such as a chain of trust, can prevent unauthorized access to the device's firmware and protect against tampering during the boot process. This research is based on the firmware bootloader and application dataflow taint analysis and security assessment of IoT devices as the most critical step in ensuring the security and integrity of these devices. This process helps identify vulnerabilities and potential attack vectors that attackers could exploit and provides a foundation for developing effective remediation strategies.
  5. Ibrahim AO, Wan Daud WMA, Abdul Patah MF, Halilu A, Juan JC, Tanimu G
    Phys Chem Chem Phys, 2024 Apr 03;26(14):10622-10632.
    PMID: 38506646 DOI: 10.1039/d4cp00070f
    The thermochemical conversion of CO2 into methanol, a process known for its selectivity, often encounters a significant obstacle: the reverse water gas reaction. This problem emerges due to the demanding high temperatures and pressures, causing instability in catalytic performance. Recent endeavours have focused on innovatively designing catalysts capable of withstanding such conditions. Given the costliness of experimental approaches, a theoretical framework has emerged as a promising avenue for addressing the challenges in methanol production. It has been reported that transition metals, especially Pd, provide ideal binding sites for CO2 molecules and hydrogen atoms, facilitating their interactions and subsequent conversion to methanol. In the geometric single-atom form, their surface enables precise control over the reaction pathways and enhances the selectivity towards methanol. In our study, we employed density functional theory (DFT) to explore the conversion of CO2 to CH3OH on Pd1-Cu(111) and Pd1-Ag(111) single-atom alloy (SAA) catalysts. Our investigation involved mapping out the complex reaction pathways of CO2 hydrogenation to CH3OH using microkinetic reaction modelling and mechanisms. We examined three distinct pathways: the COOH* formation pathway, the HCOO* formation pathway, and the dissociation of CO2* to CO* pathway. This comprehensive analysis encompassed the determination of adsorption energies for all reactants, transition states, and resultant products. Additionally, we investigated the thermodynamic and kinetic profiles of individual reaction steps. Our findings emphasised the essential role of the Pd single atom in enhancing the activation of CO2, highlighting the key mechanism underlying this catalytic process. The favoured route for methanol generation on the Pd1-Ag(111) single-atom alloy (SAA) surface unfolds as follows: CO2* progresses through a series of transformations, transitioning successively into HCOO*, HCOOH*, H2COOH*, CH2O*, and CH2OH*, terminating in the formation of CH3OH*, due to lower activation energies and higher rate constants.
  6. Alhamami AH, Falude E, Ibrahim AO, Dodo YA, Daniel OL, Atamurotov F
    Water Sci Technol, 2024 Apr;89(8):2149-2163.
    PMID: 38678415 DOI: 10.2166/wst.2024.092
    This study employs diverse machine learning models, including classic artificial neural network (ANN), hybrid ANN models, and the imperialist competitive algorithm and emotional artificial neural network (EANN), to predict crucial parameters such as fresh water production and vapor temperatures. Evaluation metrics reveal the integrated ANN-ICA model outperforms the classic ANN, achieving a remarkable 20% reduction in mean squared error (MSE). The emotional artificial neural network (EANN) demonstrates superior accuracy, attaining an impressive 99% coefficient of determination (R2) in predicting freshwater production and vapor temperatures. The comprehensive comparative analysis extends to environmental assessments, displaying the solar desalination system's compatibility with renewable energy sources. Results highlight the potential for the proposed system to conserve water resources and reduce environmental impact, with a substantial decrease in total dissolved solids (TDS) from over 6,000 ppm to below 50 ppm. The findings underscore the efficacy of machine learning models in optimizing solar-driven desalination systems, providing valuable insights into their capabilities for addressing water scarcity challenges and contributing to the global shift toward sustainable and environmentally friendly water production methods.
  7. Idris NF, Ismail MA, Jaya MIM, Ibrahim AO, Abulfaraj AW, Binzagr F
    PLoS One, 2024;19(5):e0302595.
    PMID: 38718024 DOI: 10.1371/journal.pone.0302595
    Diabetes Mellitus is one of the oldest diseases known to humankind, dating back to ancient Egypt. The disease is a chronic metabolic disorder that heavily burdens healthcare providers worldwide due to the steady increment of patients yearly. Worryingly, diabetes affects not only the aging population but also children. It is prevalent to control this problem, as diabetes can lead to many health complications. As evolution happens, humankind starts integrating computer technology with the healthcare system. The utilization of artificial intelligence assists healthcare to be more efficient in diagnosing diabetes patients, better healthcare delivery, and more patient eccentric. Among the advanced data mining techniques in artificial intelligence, stacking is among the most prominent methods applied in the diabetes domain. Hence, this study opts to investigate the potential of stacking ensembles. The aim of this study is to reduce the high complexity inherent in stacking, as this problem contributes to longer training time and reduces the outliers in the diabetes data to improve the classification performance. In addressing this concern, a novel machine learning method called the Stacking Recursive Feature Elimination-Isolation Forest was introduced for diabetes prediction. The application of stacking with Recursive Feature Elimination is to design an efficient model for diabetes diagnosis while using fewer features as resources. This method also incorporates the utilization of Isolation Forest as an outlier removal method. The study uses accuracy, precision, recall, F1 measure, training time, and standard deviation metrics to identify the classification performances. The proposed method acquired an accuracy of 79.077% for PIMA Indians Diabetes and 97.446% for the Diabetes Prediction dataset, outperforming many existing methods and demonstrating effectiveness in the diabetes domain.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links