-
GGNB: Graph-Based Gaussian Naive Bayes Intrusion Detection System for CAN Bus
Authors:
Riadul Islam,
Maloy K. Devnath,
Manar D. Samad,
Syed Md Jaffrey Al Kadry
Abstract:
The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specif…
▽ More
The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this paper we propose a novel {\textbf g}raph-based {\textbf G}aussian {\textbf n}aive {\textbf B}ayes (GGNB) intrusion detection algorithm by leveraging graph properties and PageRank-related features. The GGNB on the real rawCAN data set~\cite{Lee:2017} yields 99.61\%, 99.83\%, 96.79\%, and 96.20\% detection accuracy for denial of service (DoS), fuzzy, spoofing, replay, mixed attacks, respectively. Also, using OpelAstra data set~\cite{Guillaume:2019}, the proposed methodology has 100\%, 99.85\%, 99.92\%, 100\%, 99.92\%, 97.75\% and 99.57\% detection accuracy considering DoS, diagnostic, fuzzing CAN ID, fuzzing payload, replay, suspension, and mixed attacks, respectively. The GGNB-based methodology requires about $239\times$ and $135\times$ lower training and tests times, respectively, compared to the SVM classifier used in the same application. Using Xilinx Zybo Z7 field-programmable gate array (FPGA) board, the proposed GGNB requires $5.7 \times$, $5.9 \times$, $5.1 \times$, and $3.6 \times$ fewer slices, LUTs, flip-flops, and DSP units, respectively, than conventional NN architecture.
△ Less
Submitted 24 August, 2021;
originally announced August 2021.
-
Development of a Machine-Learning System to Classify Lung CT Scan Images into Normal/COVID-19 Class
Authors:
Seifedine Kadry,
Venkatesan Rajinikanth,
Seungmin Rho,
Nadaradjane Sri Madhava Raja,
Vaddi Seshagiri Rao,
Krishnan Palani Thanaraj
Abstract:
Recently, the lung infection due to Coronavirus Disease (COVID-19) affected a large human group worldwide and the assessment of the infection rate in the lung is essential for treatment planning. This research aims to propose a Machine-Learning-System (MLS) to detect the COVID-19 infection using the CT scan Slices (CTS). This MLS implements a sequence of methods, such as multi-thresholding, image…
▽ More
Recently, the lung infection due to Coronavirus Disease (COVID-19) affected a large human group worldwide and the assessment of the infection rate in the lung is essential for treatment planning. This research aims to propose a Machine-Learning-System (MLS) to detect the COVID-19 infection using the CT scan Slices (CTS). This MLS implements a sequence of methods, such as multi-thresholding, image separation using threshold filter, feature-extraction, feature-selection, feature-fusion and classification. The initial part implements the Chaotic-Bat-Algorithm and Kapur's Entropy (CBA+KE) thresholding to enhance the CTS. The threshold filter separates the image into two segments based on a chosen threshold 'Th'. The texture features of these images are extracted, refined and selected using the chosen procedures. Finally, a two-class classifier system is implemented to categorize the chosen CTS (n=500 with a pixel dimension of 512x512x1) into normal/COVID-19 group. In this work, the classifiers, such as Naive Bayes (NB), k-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF) and Support Vector Machine with linear kernel (SVM) are implemented and the classification task is performed using various feature vectors. The experimental outcome of the SVM with Fused-Feature-Vector (FFV) helped to attain a detection accuracy of 89.80%.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Implementation of Deep Neural Networks to Classify EEG Signals using Gramian Angular Summation Field for Epilepsy Diagnosis
Authors:
K. Palani Thanaraj,
B. Parvathavarthini,
U. John Tanik,
V. Rajinikanth,
Seifedine Kadry,
K. Kamalanand
Abstract:
This paper evaluates the approach of imaging timeseries data such as EEG in the diagnosis of epilepsy through Deep Neural Network (DNN). EEG signal is transformed into an RGB image using Gramian Angular Summation Field (GASF). Many such EEG epochs are transformed into GASF images for the normal and focal EEG signals. Then, some of the widely used Deep Neural Networks for image classification probl…
▽ More
This paper evaluates the approach of imaging timeseries data such as EEG in the diagnosis of epilepsy through Deep Neural Network (DNN). EEG signal is transformed into an RGB image using Gramian Angular Summation Field (GASF). Many such EEG epochs are transformed into GASF images for the normal and focal EEG signals. Then, some of the widely used Deep Neural Networks for image classification problems are used here to detect the focal GASF images. Three pre-trained DNN such as the AlexNet, VGG16, and VGG19 are validated for epilepsy detection based on the transfer learning approach. Furthermore, the textural features are extracted from GASF images, and prominent features are selected for a multilayer Artificial Neural Network (ANN) classifier. Lastly, a Custom Convolutional Neural Network (CNN) with three CNN layers, Batch Normalization, Max-pooling layer, and Dense layers, is proposed for epilepsy diagnosis from GASF images. The results of this paper show that the Custom CNN model was able to discriminate against the focal and normal GASF images with an average peak Precision of 0.885, Recall of 0.92, and F1-score of 0.90. Moreover, the Area Under the Curve (AUC) value of the Receiver Operating Characteristic (ROC) curve is 0.92 for the Custom CNN model. This paper suggests that Deep Learning methods widely used in image classification problems can be an alternative approach for epilepsy detection from EEG signals through GASF images.
△ Less
Submitted 8 March, 2020;
originally announced March 2020.
-
Design and Performance Study of Smart Antenna Systems for WIMAX Applications
Authors:
Ayman Abdallah,
Seifedine Kadry,
Chibli Joumaa
Abstract:
In this paper we propose an approach that uses homodyne receivers to design smart antenna systems. The receivers functions are to detect angles of arrivals of seven incoming RF signals using MUSIC or ESPRIT algorithms. The characteristics of each algorithm are critical for the systems precision as well as receivers types. Results are deduced from the simulation of each system, using the Advanced D…
▽ More
In this paper we propose an approach that uses homodyne receivers to design smart antenna systems. The receivers functions are to detect angles of arrivals of seven incoming RF signals using MUSIC or ESPRIT algorithms. The characteristics of each algorithm are critical for the systems precision as well as receivers types. Results are deduced from the simulation of each system, using the Advanced Design System (ADS) and MATLAB. These are compared to results deduced from real systems in the WIMAX (3.5GHz) domains.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
On The Optimization of Dijkstras Algorithm
Authors:
Seifedine Kadry,
Ayman Abdallah,
Chibli Joumaa
Abstract:
In this paper, we propose some amendment on Dijkstras algorithm in order to optimize it by reducing the number of iterations. The main idea is to solve the problem where more than one node satisfies the condition of the second step in the traditional Dijkstras algorithm. After application of the proposed modifications, the maximum number of iterations of Dijkstras algorithm is less than the number…
▽ More
In this paper, we propose some amendment on Dijkstras algorithm in order to optimize it by reducing the number of iterations. The main idea is to solve the problem where more than one node satisfies the condition of the second step in the traditional Dijkstras algorithm. After application of the proposed modifications, the maximum number of iterations of Dijkstras algorithm is less than the number of the graphs nodes.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
New design of Robotics Remote lab
Authors:
Mohammad Alkafagee,
Seifedine Kadry
Abstract:
The Robotic Remote Laboratory controls the Robot labs via the Internet and applies the Robot experiment in easy and advanced way. If we want to enhance the RRL system, we must study requirements of the Robot experiment in a deeply way. One of key requirements of the Robot experiment is the Control algorithm that includes all important activities to affect the Robot; one of them relates the path or…
▽ More
The Robotic Remote Laboratory controls the Robot labs via the Internet and applies the Robot experiment in easy and advanced way. If we want to enhance the RRL system, we must study requirements of the Robot experiment in a deeply way. One of key requirements of the Robot experiment is the Control algorithm that includes all important activities to affect the Robot; one of them relates the path or obstacle. Our goal is to produce a new design of the RRL includes a new treatment to the Control algorithm depends on isolation one of the Control algorithm's activities that relates the paths in a separated algorithm, i.e., design the (Path planning algorithm) is independent of the original Control algorithm. This aim can be achieved by depending on the light to produce the Light obstacle. To apply the Light obstacle, we need to hardware (Light control server and Light arms) and soft ware (path planning algorithm).The NXT 2.0 Robot will sense the Light obstacle depending on the Light sensor of it. The new design has two servers, one for the path (Light control server) and other for the other activities of the Control algorithm (Robot control server).The website of the new design includes three main parts (Lab Reservation, Open Lab, Download Simulation).We proposed a set of scenarios for organizing the reservation of the Remote Lab. Additionally, we developed an appropriate software to simulate the Robot and to practice it before usage the Remote lab.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
Applying Social Network Analysis to Analyze a Web-Based Community
Authors:
Mohammed Al-Taie,
Seifedine Kadry
Abstract:
This paper deals with a very renowned website (that is Book-Crossing) from two angles: The first angle focuses on the direct relations between users and books. Many things can be inferred from this part of analysis such as who is more interested in book reading than others and why? Which books are most popular and which users are most active and why? The task requires the use of certain social net…
▽ More
This paper deals with a very renowned website (that is Book-Crossing) from two angles: The first angle focuses on the direct relations between users and books. Many things can be inferred from this part of analysis such as who is more interested in book reading than others and why? Which books are most popular and which users are most active and why? The task requires the use of certain social network analysis measures (e.g. degree centrality). What does it mean when two users like the same book? Is it the same when other two users have one thousand books in common? Who is more likely to be a friend of whom and why? Are there specific people in the community who are more qualified to establish large circles of social relations? These questions (and of course others) were answered through the other part of the analysis, which will take us to probe the potential social relations between users in this community. Although these relationships do not exist explicitly, they can be inferred with the help of affiliation network analysis and techniques such as m-slice.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
Green WSUS
Authors:
Seifedine Kadry,
Chibli Joumaa
Abstract:
The new era of information and communication technology (ICT) calls for a greater understanding of the environmental impacts of recent technology. With increasing energy cost and growing environmental concerns, green IT is receiving more and more attention. Network and system design play a crucial role in both computing and telecommunication systems. Significant part of this energy cost goes to sy…
▽ More
The new era of information and communication technology (ICT) calls for a greater understanding of the environmental impacts of recent technology. With increasing energy cost and growing environmental concerns, green IT is receiving more and more attention. Network and system design play a crucial role in both computing and telecommunication systems. Significant part of this energy cost goes to system update by downloading regularly patches and bug fixes to solve security problems and to assure that the operating system and other systems function properly. This paper describes a new design of Windows Server Update Services (WSUS), system responsible of downloads of the mentioned patches and updates from Microsoft Update website and then distributes them to computers on a network. The general idea behind our proposed design is simple. Instead of the periodical check done by the WSUS servers to ensure update form Microsoft main servers, we rather propose to reverse the scenario in order to reduce energy consumption. In the proposed design, the Microsoft main server(s) sends signal to all WSUS servers to inform them about new updates. Once the signal received, WSUS can contact the main server to start downloading.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
XML parser GUI using .NET Technology
Authors:
Seifedine Kadry,
Jimbo Claver
Abstract:
The purpose of this paper is to implement software that can save time, effort, and facilitate XML and XSL programming. The XML parser helps the programmer to determine whether the XML document is Well-formed or not, by specifying if any the positions of the errors.
The purpose of this paper is to implement software that can save time, effort, and facilitate XML and XSL programming. The XML parser helps the programmer to determine whether the XML document is Well-formed or not, by specifying if any the positions of the errors.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
Toward New Vision in Teaching Calculus
Authors:
Seifedine Kadry,
Maha ElShalkamy
Abstract:
Usually the first course in mathematics is calculus. Its a core course in the curriculum of the Business, Engineering and the Sciences. However many students face difficulties to learn calculus. These difficulties are often caused by the prior fear of mathematics. The students today cant live without using computer technology. The uses of computer for teaching and learning can transform the boring…
▽ More
Usually the first course in mathematics is calculus. Its a core course in the curriculum of the Business, Engineering and the Sciences. However many students face difficulties to learn calculus. These difficulties are often caused by the prior fear of mathematics. The students today cant live without using computer technology. The uses of computer for teaching and learning can transform the boring traditional methodology of teach to more active and attractive method. In this paper, we will show how we can use Excel in teaching calculus to improve our students learning and understanding through different types of applications ranging from Business to Engineering. The effectiveness of the proposed methodology was tested on a random sample of 45 students from different majors over a period of two semesters.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
An Improvement of RC4 Cipher Using Vigenere Cipher
Authors:
Seifedine Kadry,
Mohamad Smaili
Abstract:
This paper develops a new algorithm to improve the security of RC4. Given that RC4 cipher is widely used in the wireless communication and has some weaknesses in the security of RC4 cipher, our idea is based on the combination of the RC4 and the poly alphabetic cipher Vigenère to give a new and more secure algorithm which we called VRC4. In this technique the plain text is encrypted using the clas…
▽ More
This paper develops a new algorithm to improve the security of RC4. Given that RC4 cipher is widely used in the wireless communication and has some weaknesses in the security of RC4 cipher, our idea is based on the combination of the RC4 and the poly alphabetic cipher Vigenère to give a new and more secure algorithm which we called VRC4. In this technique the plain text is encrypted using the classic RC4 cipher then re-encrypt the resulted cipher text using Vigenère cipher to be a more secure cipher text. For simplicity, we have implemented our new algorithm in Java Script taking into consideration two factors: improvement of the security and the time complexity. To show the performance of the new algorithm, we have used the well known network cracking software KisMac.
△ Less
Submitted 23 November, 2011;
originally announced November 2011.
-
A New Proposed Technique to Improve Software Regression Testing Cost
Authors:
Seifedine Kadry
Abstract:
In this article, we describe the regression test process to test and verify the changes made on software. A developed technique use the automation test based on decision tree and test selection process in order to reduce the testing cost is given. The developed technique is applied to a practical case and the result show its improvement.
In this article, we describe the regression test process to test and verify the changes made on software. A developed technique use the automation test based on decision tree and test selection process in order to reduce the testing cost is given. The developed technique is applied to a practical case and the result show its improvement.
△ Less
Submitted 23 November, 2011;
originally announced November 2011.
-
A New Technique to Backup and Restore DBMS using XML and .NET Technologies
Authors:
Seifedine Kadry,
Mohamad Smaili,
Hussam Kassem,
Hassan Hayek
Abstract:
In this paper, we proposed a new technique for backing up and restoring different Database Management Systems (DBMS). The technique is enabling to backup and restore a part of or the whole database using a unified interface using ASP.NET and XML technologies. It presents a Web Solution allowing the administrators to do their jobs from everywhere, locally or remotely. To show the importance of our…
▽ More
In this paper, we proposed a new technique for backing up and restoring different Database Management Systems (DBMS). The technique is enabling to backup and restore a part of or the whole database using a unified interface using ASP.NET and XML technologies. It presents a Web Solution allowing the administrators to do their jobs from everywhere, locally or remotely. To show the importance of our solution, we have taken two case studies, oracle 11g and SQL Server 2008.
△ Less
Submitted 23 November, 2011;
originally announced November 2011.
-
A New Round Robin Based Scheduling Algorithm for Operating Systems: Dynamic Quantum Using the Mean Average
Authors:
Abbas Noon,
Ali Kalakech,
Seifedine Kadry
Abstract:
Round Robin, considered as the most widely adopted CPU scheduling algorithm, undergoes severe problems directly related to quantum size. If time quantum chosen is too large, the response time of the processes is considered too high. On the other hand, if this quantum is too small, it increases the overhead of the CPU. In this paper, we propose a new algorithm, called AN, based on a new approach ca…
▽ More
Round Robin, considered as the most widely adopted CPU scheduling algorithm, undergoes severe problems directly related to quantum size. If time quantum chosen is too large, the response time of the processes is considered too high. On the other hand, if this quantum is too small, it increases the overhead of the CPU. In this paper, we propose a new algorithm, called AN, based on a new approach called dynamic-time-quantum; the idea of this approach is to make the operating systems adjusts the time quantum according to the burst time of the set of waiting processes in the ready queue. Based on the simulations and experiments, we show that the new proposed algorithm solves the fixed time quantum problem and increases the performance of Round Robin.
△ Less
Submitted 22 November, 2011;
originally announced November 2011.