Skip to main content

Showing 1–32 of 32 results for author: Elsayed, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.02606  [pdf, other

    cs.OH cond-mat.mtrl-sci

    Carbon Per Transistor (CPT): The Golden Formula for Green Computing Metrics

    Authors: Zag ElSayed, Nelly Elsayed, Ahmed Abdelgawad

    Abstract: As computing power advances, the environmental cost of semiconductor manufacturing and operation has become a critical concern. However, current sustainability metrics fail to quantify carbon emissions at the transistor level, the fundamental building block of modern processors. This paper introduces a Carbon Per Transistor (CPT) formula -- a novel approach and green implementation metric to measu… ▽ More

    Submitted 1 February, 2025; originally announced February 2025.

  2. arXiv:2501.18549  [pdf, other

    cs.CR

    CryptoDNA: A Machine Learning Paradigm for DDoS Detection in Healthcare IoT, Inspired by crypto jacking prevention Models

    Authors: Zag ElSayed, Ahmed Abdelgawad, Nelly Elsayed

    Abstract: The rapid integration of the Internet of Things (IoT) and Internet of Medical (IoM) devices in the healthcare industry has markedly improved patient care and hospital operations but has concurrently brought substantial risks. Distributed Denial-of-Service (DDoS) attacks present significant dangers, jeopardizing operational stability and patient safety. This study introduces CryptoDNA, an innovativ… ▽ More

    Submitted 30 January, 2025; originally announced January 2025.

    Comments: 6 pages, 8 figures, under review

  3. arXiv:2501.11250  [pdf, other

    cs.CR

    Cybersecurity and Frequent Cyber Attacks on IoT Devices in Healthcare: Issues and Solutions

    Authors: Zag ElSayed, Ahmed Abdelgawad, Nelly Elsayed

    Abstract: Integrating Internet of Things (IoT) devices in healthcare has revolutionized patient care, offering improved monitoring, diagnostics, and treatment. However, the proliferation of these devices has also introduced significant cybersecurity challenges. This paper reviews the current landscape of cybersecurity threats targeting IoT devices in healthcare, discusses the underlying issues contributing… ▽ More

    Submitted 19 January, 2025; originally announced January 2025.

    Comments: 7 pages, 14 figures, under review

  4. arXiv:2406.17793  [pdf, other

    cs.LG cs.CL cs.CY

    Deep Learning Approaches for Detecting Adversarial Cyberbullying and Hate Speech in Social Networks

    Authors: Sylvia Worlali Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer, Amanda La Guardia

    Abstract: Cyberbullying is a significant concern intricately linked to technology that can find resolution through technological means. Despite its prevalence, technology also provides solutions to mitigate cyberbullying. To address growing concerns regarding the adverse impact of cyberbullying on individuals' online experiences, various online platforms and researchers are actively adopting measures to enh… ▽ More

    Submitted 30 May, 2024; originally announced June 2024.

    Comments: 10 pages, 8 figures, 3 tables, under reviewing

  5. arXiv:2406.11867  [pdf, ps, other

    cs.CY

    Not as Simple as It Looked: Are We Concluding for Biased Arrest Practices?

    Authors: Murat Ozer, Halil Akbas, Ismail Onat, Mehmet Bastug, Arif Akgul, Nelly ElSayed, Zag ElSayed, Multu Koseli, Niyazi Ekici

    Abstract: This study examines racial disparities in violent arrest outcomes, challenging conventional methods through a nuanced analysis of Cincinnati Police Department data. Acknowledging the intricate nature of racial disparity, the study categorizes explanations into types of place, types of person, and a combination of both, emphasizing the impact of neighborhood characteristics on crime distribution an… ▽ More

    Submitted 13 April, 2024; originally announced June 2024.

  6. arXiv:2401.07995  [pdf, other

    cs.CR

    The Pulse of Fileless Cryptojacking Attacks: Malicious PowerShell Scripts

    Authors: Said Varlioglu, Nelly Elsayed, Eva Ruhsar Varlioglu, Murat Ozer, Zag ElSayed

    Abstract: Fileless malware predominantly relies on PowerShell scripts, leveraging the native capabilities of Windows systems to execute stealthy attacks that leave no traces on the victim's system. The effectiveness of the fileless method lies in its ability to remain operational on victim endpoints through memory execution, even if the attacks are detected, and the original malicious scripts are removed. T… ▽ More

    Submitted 21 February, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: 10 pages, 1 figure

  7. arXiv:2401.07368  [pdf, other

    cs.CR

    A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

    Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay

    Abstract: The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management. The Global IoT in Healthcare Market value is $252.2 Billion in 2023. However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data. This paper introd… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: 7 pages, 7 figures, 4 tables, under review

  8. arXiv:2401.06970  [pdf, other

    cs.LG cs.HC eess.SP

    TemporalAugmenter: An Ensemble Recurrent Based Deep Learning Approach for Signal Classification

    Authors: Nelly Elsayed, Constantinos L. Zekios, Navid Asadizanjani, Zag ElSayed

    Abstract: Ensemble modeling has been widely used to solve complex problems as it helps to improve overall performance and generalization. In this paper, we propose a novel TemporalAugmenter approach based on ensemble modeling for augmenting the temporal information capturing for long-term and short-term dependencies in data integration of two variations of recurrent neural networks in two learning streams t… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: 9 pages, 5 figures, 9 tables, under review process

  9. arXiv:2401.03587  [pdf, ps, other

    cs.CV cs.AI

    Big Data and Deep Learning in Smart Cities: A Comprehensive Dataset for AI-Driven Traffic Accident Detection and Computer Vision Systems

    Authors: Victor Adewopo, Nelly Elsayed, Zag Elsayed, Murat Ozer, Constantinos Zekios, Ahmed Abdelgawad, Magdy Bayoumi

    Abstract: In the dynamic urban landscape, where the interplay of vehicles and pedestrians defines the rhythm of life, integrating advanced technology for safety and efficiency is increasingly crucial. This study delves into the application of cutting-edge technological methods in smart cities, focusing on enhancing public safety through improved traffic accident detection. Action recognition plays a pivotal… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

  10. arXiv:2401.01023  [pdf, other

    cs.HC cs.LG

    CautionSuicide: A Deep Learning Based Approach for Detecting Suicidal Ideation in Real Time Chatbot Conversation

    Authors: Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Suicide is recognized as one of the most serious concerns in the modern society. Suicide causes tragedy that affects countries, communities, and families. There are many factors that lead to suicidal ideations. Early detection of suicidal ideations can help to prevent suicide occurrence by providing the victim with the required professional support, especially when the victim does not recognize th… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: 5 pages, 6 figures, 4 tables, Under review in IEEE conference

  11. arXiv:2401.00814  [pdf, other

    cs.HC cs.CY

    Agricultural 4.0 Leveraging on Technological Solutions: Study for Smart Farming Sector

    Authors: Emmanuel Kojo Gyamfi, Zag ElSayed, Jess Kropczynski, Mustapha Awinsongya Yakubu, Nelly Elsayed

    Abstract: By 2050, it is predicted that there will be 9 billion people on the planet, which will call for more production, lower costs, and the preservation of natural resources. It is anticipated that atypical occurrences and climate change will pose severe risks to agricultural output. It follows that a 70% or more significant rise in food output is anticipated. Smart farming, often known as agriculture 4… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: 9 pages, 4 figures, under reviewing process

  12. arXiv:2311.01185  [pdf

    cs.CV cs.AI

    Revolutionizing Healthcare Image Analysis in Pandemic-Based Fog-Cloud Computing Architectures

    Authors: Al Zahraa Elsayed, Khalil Mohamed, Hany Harb

    Abstract: The emergence of pandemics has significantly emphasized the need for effective solutions in healthcare data analysis. One particular challenge in this domain is the manual examination of medical images, such as X-rays and CT scans. This process is time-consuming and involves the logistical complexities of transferring these images to centralized cloud computing servers. Additionally, the speed and… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  13. arXiv:2307.15225  [pdf, other

    cs.CY cs.SI

    A Secure Open-Source Intelligence Framework For Cyberbullying Investigation

    Authors: Sylvia Worlali Azumah, Victor Adewopo, Zag ElSayed, Nelly Elsayed, Murat Ozer

    Abstract: Cyberbullying has become a pervasive issue based on the rise of cell phones and internet usage affecting individuals worldwide. This paper proposes an open-source intelligence pipeline using data from Twitter to track keywords relevant to cyberbullying in social media to build dashboards for law enforcement agents. We discuss the prevalence of cyberbullying on social media, factors that compel ind… ▽ More

    Submitted 11 August, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

    Comments: 8 pages, 5 figure, under review

  14. arXiv:2307.12128  [pdf, other

    cs.CV cs.AI cs.CY cs.LG

    AI on the Road: A Comprehensive Analysis of Traffic Accidents and Accident Detection System in Smart Cities

    Authors: Victor Adewopo, Nelly Elsayed, Zag Elsayed, Murat Ozer, Victoria Wangia-Anderson, Ahmed Abdelgawad

    Abstract: Accident detection and traffic analysis is a critical component of smart city and autonomous transportation systems that can reduce accident frequency, severity and improve overall traffic management. This paper presents a comprehensive analysis of traffic accidents in different regions across the United States using data from the National Highway Traffic Safety Administration (NHTSA) Crash Report… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 8,8

  15. arXiv:2305.19859  [pdf, other

    cs.SI

    Exploring the Journey to Drug Overdose: Applying the Journey to Crime Framework to Drug Sales Locations and Overdose Death Locations

    Authors: Murat Ozer, Ismail Onat, Halil Akbas, Nelly Elsayed, Zag ElSayed, Said Varlioglu

    Abstract: Drug overdose is a pressing public health concern in the United States, resulting in a significant number of fatalities each year. In this study, we employ the Journey to Crime (JTC) framework borrowed from the field of environmental criminology to examine the association between drug sales locations and overdose death locations. In this research, our objective is to elucidate the trajectory of ov… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: Under review in The 7th International Conference on Applied Cognitive Computing 2023

  16. arXiv:2305.19347  [pdf, other

    cs.LG eess.SP

    Machine Learning Based IoT Adaptive Architecture for Epilepsy Seizure Detection: Anatomy and Analysis

    Authors: Zag ElSayed, Murat Ozer, Nelly Elsayed, Ahmed Abdelgawad

    Abstract: A seizure tracking system is crucial for monitoring and evaluating epilepsy treatments. Caretaker seizure diaries are used in epilepsy care today, but clinical seizure monitoring may miss seizures. Monitoring devices that can be worn may be better tolerated and more suitable for long-term ambulatory use. Many techniques and methods are proposed for seizure detection; However, simplicity and afford… ▽ More

    Submitted 5 September, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Under review, 5 pages, 7 figures, 3 tables

  17. Cyberbullying in Text Content Detection: An Analytical Review

    Authors: Sylvia W Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Technological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most exist… ▽ More

    Submitted 18 March, 2023; originally announced March 2023.

    Comments: 8 pages. Under review

  18. arXiv:2302.02456  [pdf, other

    eess.IV cs.CV cs.LG q-bio.QM

    Deep Learning Approach for Early Stage Lung Cancer Detection

    Authors: Saleh Abunajm, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Lung cancer is the leading cause of death among different types of cancers. Every year, the lives lost due to lung cancer exceed those lost to pancreatic, breast, and prostate cancer combined. The survival rate for lung cancer patients is very low compared to other cancer patients due to late diagnostics. Thus, early lung cancer diagnostics is crucial for patients to receive early treatments, incr… ▽ More

    Submitted 15 February, 2023; v1 submitted 5 February, 2023; originally announced February 2023.

    Comments: Under review in FLAIRS 2023

  19. arXiv:2302.02013  [pdf, other

    cs.CR cs.LG

    IoT Botnet Detection Using an Economic Deep Learning Model

    Authors: Nelly Elsayed, Zag ElSayed, Magdy Bayoumi

    Abstract: The rapid progress in technology innovation usage and distribution has increased in the last decade. The rapid growth of the Internet of Things (IoT) systems worldwide has increased network security challenges created by malicious third parties. Thus, reliable intrusion detection and network forensics systems that consider security concerns and IoT systems limitations are essential to protect such… ▽ More

    Submitted 28 May, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted in IEEE AIIoT 2023 conference

  20. arXiv:2302.01417  [pdf, other

    cs.LG cs.CV

    A Convolutional-based Model for Early Prediction of Alzheimer's based on the Dementia Stage in the MRI Brain Images

    Authors: Shrish Pellakur, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Alzheimer's disease is a degenerative brain disease. Being the primary cause of Dementia in adults and progressively destroys brain memory. Though Alzheimer's disease does not have a cure currently, diagnosing it at an earlier stage will help reduce the severity of the disease. Thus, early diagnosis of Alzheimer's could help to reduce or stop the disease from progressing. In this paper, we propose… ▽ More

    Submitted 15 February, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: Short paper, Under Review in FLAIRS-36

  21. arXiv:2301.04794  [pdf, other

    cs.LG

    LiteLSTM Architecture Based on Weights Sharing for Recurrent Neural Networks

    Authors: Nelly Elsayed, Zag ElSayed, Anthony S. Maida

    Abstract: Long short-term memory (LSTM) is one of the robust recurrent neural network architectures for learning sequential data. However, it requires considerable computational power to learn and implement both software and hardware aspects. This paper proposed a novel LiteLSTM architecture based on reducing the LSTM computation components via the weights sharing concept to reduce the overall architecture… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: Under the second reviewing round in the SN Computer Science Journal. Extended version of the LiteLSTM Architecture for Deep Recurrent Neural Networks paper that have been published in the IEEE ISCAS 2022 conference. arXiv admin note: substantial text overlap with arXiv:2201.11624

  22. arXiv:2210.09403  [pdf, other

    eess.IV cs.CV cs.LG

    A Transfer Learning Based Approach for Classification of COVID-19 and Pneumonia in CT Scan Imaging

    Authors: Gargi Desai, Nelly Elsayed, Zag Elsayed, Murat Ozer

    Abstract: The world is still overwhelmed by the spread of the COVID-19 virus. With over 250 Million infected cases as of November 2021 and affecting 219 countries and territories, the world remains in the pandemic period. Detecting COVID-19 using the deep learning method on CT scan images can play a vital role in assisting medical professionals and decision authorities in controlling the spread of the disea… ▽ More

    Submitted 26 October, 2022; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: 8 pages, 8 figures, under reviewing process

  23. arXiv:2209.04427  [pdf, other

    cs.AR cs.ET cs.LG eess.SP

    Zydeco-Style Spike Sorting Low Power VLSI Architecture for IoT BCI Implants

    Authors: Zag ElSayed, Murat Ozer, Nelly Elsayed, Magdy Bayoumi

    Abstract: Brain Computer Interface (BCI) has great potential for solving many brain signal analysis limitations, mental disorder resolutions, and restoring missing limb functionality via neural-controlled implants. However, there is no single available, and safe implant for daily life usage exists yet. Most of the proposed implants have several implementation issues, such as infection hazards and heat dissi… ▽ More

    Submitted 29 October, 2022; v1 submitted 31 August, 2022; originally announced September 2022.

    Comments: 6 pages, 7 Figures

  24. arXiv:2208.12812  [pdf, other

    eess.AS cs.HC cs.LG cs.SD

    Speech Emotion Recognition using Supervised Deep Recurrent System for Mental Health Monitoring

    Authors: Nelly Elsayed, Zag ElSayed, Navid Asadizanjani, Murat Ozer, Ahmed Abdelgawad, Magdy Bayoumi

    Abstract: Understanding human behavior and monitoring mental health are essential to maintaining the community and society's safety. As there has been an increase in mental health problems during the COVID-19 pandemic due to uncontrolled mental health, early detection of mental issues is crucial. Nowadays, the usage of Intelligent Virtual Personal Assistants (IVA) has increased worldwide. Individuals use th… ▽ More

    Submitted 26 October, 2022; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: 6 pages, 5 figures, 3 tables, accepted in the IEEE WFIoT2022

  25. arXiv:2208.09588  [pdf, other

    cs.CV cs.AI cs.CY

    Review on Action Recognition for Accident Detection in Smart City Transportation Systems

    Authors: Victor Adewopo, Nelly Elsayed, Zag ElSayed, Murat Ozer, Ahmed Abdelgawad, Magdy Bayoumi

    Abstract: Action detection and public traffic safety are crucial aspects of a safe community and a better society. Monitoring traffic flows in a smart city using different surveillance cameras can play a significant role in recognizing accidents and alerting first responders. The utilization of action recognition (AR) in computer vision tasks has contributed towards high-precision applications in video surv… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

    Comments: 16 pages

  26. Vision-Based American Sign Language Classification Approach via Deep Learning

    Authors: Nelly Elsayed, Zag ElSayed, Anthony S. Maida

    Abstract: Hearing-impaired is the disability of partial or total hearing loss that causes a significant problem for communication with other people in society. American Sign Language (ASL) is one of the sign languages that most commonly used language used by Hearing impaired communities to communicate with each other. In this paper, we proposed a simple deep learning model that aims to classify the American… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: 4 pages, Accepted in the The Florida AI Research Society (FLAIRS-35) 2022

  27. arXiv:2203.03175  [pdf, other

    cs.CR

    The Dangerous Combo: Fileless Malware and Cryptojacking

    Authors: Said Varlioglu, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount of unauthorized cryptocurrency mining has increased after 2019. Adversaries have started to merge these two different cyberattacks to gain more invisibility and p… ▽ More

    Submitted 9 March, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: 9 Pages - Accepted to be published in SoutheastCon 2022 IEEE Region 3 Technical, Professional, and Student Conference. Mobile, Alabama, USA. Mar 31st to Apr 03rd 2022. https://ieeesoutheastcon.org/

  28. arXiv:2202.11216  [pdf, other

    cs.LG

    Early Stage Diabetes Prediction via Extreme Learning Machine

    Authors: Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Diabetes is one of the chronic diseases that has been discovered for decades. However, several cases are diagnosed in their late stages. Every one in eleven of the world's adult population has diabetes. Forty-six percent of people with diabetes have not been diagnosed. Diabetes can develop several other severe diseases that can lead to patient death. Developing and rural areas suffer the most due… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

    Comments: Accepted in IEEE Southeast Con. 2022

  29. arXiv:2202.01448  [pdf, other

    cs.CR cs.CY cs.LG

    Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)

    Authors: Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad Elsayed

    Abstract: In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hacker's forums which contain indicators of compromise that can be explo… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 9 pages, 5 figures. Preprint

  30. arXiv:2201.11624  [pdf, other

    cs.LG cs.AI

    LiteLSTM Architecture for Deep Recurrent Neural Networks

    Authors: Nelly Elsayed, Zag ElSayed, Anthony S. Maida

    Abstract: Long short-term memory (LSTM) is a robust recurrent neural network architecture for learning spatiotemporal sequential data. However, it requires significant computational power for learning and implementing from both software and hardware aspects. This paper proposes a novel LiteLSTM architecture based on reducing the computation components of the LSTM using the weights sharing concept to reduce… ▽ More

    Submitted 24 October, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: Accepted in the IEEE International Symposium on Circuits and Systems (ISCAS) 2022

  31. arXiv:2111.00582  [pdf, other

    cs.CR

    Data Breaches in Healthcare Security Systems

    Authors: Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer

    Abstract: Providing security to Health Information is considered to be the topmost priority when compared to any other field. After the digitalization of the patient's records in the medical field, the healthcare/medical field has become a victim of several internal and external cyberattacks. Data breaches in the healthcare industry have been increasing rapidly. Despite having security standards such as HIP… ▽ More

    Submitted 30 August, 2022; v1 submitted 31 October, 2021; originally announced November 2021.

    Comments: 7 pages, 4 figures, under reviewing process

  32. arXiv:2106.00834  [pdf, other

    cs.NI cs.CR

    Autonomous Low Power IoT System Architecture for Cybersecurity Monitoring

    Authors: Zag ElSayed, Nelly Elsayed, Chengcheng Li, Magdy Bayoumi

    Abstract: Network security morning (NSM) is essential for any cybersecurity system, where the average cost of a cyber attack is 1.1 million. No matter how secure a system, it will eventually fail without proper and continuous monitoring. No wonder that the cybersecurity market is expected to grow up to $170.4 billion in 2022. However, the majority of legacy industries do not invest in NSM implementation unt… ▽ More

    Submitted 29 October, 2022; v1 submitted 1 June, 2021; originally announced June 2021.

    Comments: Cybersecurity, IoT, NSM, packet capture, sensor, green systems, oil and gas, Network Security Monitoring. Accepted in IEEE WF-IoT 2022