School of Engineering, Applied Science and Technology
Permanent URI for this community
Browse
Browsing School of Engineering, Applied Science and Technology by Title
Now showing 1 - 20 of 232
Results Per Page
Sort Options
Item A 3G/WiFi-enabled 6LoWPAN-based U-healthcare system for ubiquitous real-time monitoring and data logging(IEEE Computer Society, 2014) Tabish, Rohan; Ghaleb, Abdulaziz M.; Hussein, Rima; Touati, Farid; Mnaouer, Adel Ben; Khriji, Lazhar; Rasid, Mohd Fadlee A.Ubiquitous healthcare (U-healthcare) systems are expected to offer flexible and resilient high-end technological solutions enabling remote monitoring of patients health status in real-time and provisioning of feedback and remote actions by healthcare providers. In this paper, we present a 6LowPAN based U-healthcare platform that contributes to the realization of the above expectation. The proposed system comprises two sensor nodes sending temperature data and ECG signals to a remote processing unit. These sensors are being assigned an IPv6 address to enable the Internet-of-Things (IoT) functionality. A 6LowPAN-enabled edge router, connected to a PC, is serving as a base station through a serial interface, to collect data from the sensor nodes. Furthermore, a program interfacing through a Serial-Line-Internet-Protocol (SLIP) and running on the PC provides a network interface that receives IPv6 packets from the edge router. The above system is enhanced by having the application save readings from the sensors into a file that can be downloaded by a remote server using a free Cloud service such as UbuntuOne. This enhancement makes the system robust against data loss especially for outdoor healthcare services, where the 3G/4G connectivity may get lost because of signal quality fluctuations. The system provided a proof of concept of successful remote U-healthcare monitoring illustrating the IoT functionality and involving 3G/4G connectivity while being enhanced by a cloud-based backup. © 2014 IEEE.Item A Comparative Study of Autoregressive and Neural Network Models: Forecasting the GARCH Process(Springer Science and Business Media Deutschland GmbH, 2022) Kamalov, Firuz; Gurrib, Ikhlaas; Moussa, Sherif; Nazir, AmrilThe Covid-19 pandemic has highlighted the importance of forecasting in managing public health. The two of the most commonly used approaches for time series forecasting methods are autoregressive (AR) and deep learning models (DL). While there exist a number of studies comparing the performance of AR and DL models in specific domains, there is no work that analyzes the two approaches in the general context of theoretically simulated time series. To fill the gap in the literature, we conduct an empirical study using different configurations of generalized autoregressive conditionally heteroskedastic (GARCH) time series. The results show that DL models can achieve a significant degree of accuracy in fitting and forecasting AR-GARCH time series. In particular, DL models outperform the AR-based models over a range of parameter values. However, the results are not consistent and depend on a number of factors including the DL architecture, AR-GARCH configuration, and parameter values. The study demonstrates that DL models can be an effective alternative to AR-based models in time series forecasting. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.Item A computational numerical performance for solving the mathematical epidemiological model based on influenza disease(Elsevier B.V., 2022-09) Jain, Sonal; Leung, Ho-Hon; Kamalov, FiruzUnderstanding epidemic propagation patterns and assessing disease control measures require the use of mathematical and computational methodologies. In recent years, complexity science, management science, sociology, and computer science have all been progressively merged with epidemiology. The interdisciplinary collaboration has sped up the development of computational and mathematical methods for simulating epidemics. The model with the classical time derivative in the influenza disease model is formulated with the Caputo (power-law kernel), Caputo–Fabrizio (exponential kernel), and the novel Atangana–Baleanu fractional derivatives which combined both nonlocal and non-singular properties. Also this article presents the boundness and positiveness Solutions for the influenza model. The analysis of the equilibrium point is also given. Various published articles have utilized the reproductive number notion to investigate disease-spread stability. There were certain conditions proposed to predict whether there would be stability or instability. It was also advised that an analysis be conducted to discover the conditions under which infectious classes will grow or die out. Some authors pointed out that the reproductive number is limited, including its inability to fairly aid in understanding distribution patterns. The concept of strength number and analysis of derivatives of mathematical models were presented to help in understanding the disease model. Further, the stability of disease-free and endemic equilibrium is presented. Finally, a numerical solution with simulation is given. We hope to use these extra studies in a basic model to forecast the future of this research. © 2022 The Author(s)Item A Future Approach For Energy Harvesting In Trains Using Piezoelectricity(Institute of Electrical and Electronics Engineers Inc., 2023) Majeed, Salih Rashid; Al-Thaedan, Abbas; Shakir, Zaenab; Shafy, Amir A. Omran; Alsabah, Ruaa; Al-Sabbagh, AliItem A graphical user interface simulator for wireless sensor networks lifetime estimation.(2010) Ben Salem M.; Hamam H.Item A new watermarking scheme for digital videos using DCT(Walter de Gruyter GmbH, 2022-01-01) Al-Gindy, Ahmed; Omar, Aya Al-Chikh; Mashal, Omar; Shaker, Yomna; Alhogaraty, Eslam; Moussa, SherifWith the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values Δ for different videos. It offers resistance against different types of attacks. © 2022 Ahmed Al-Gindy et al., published by De Gruyter.Item A NOTE ON THE AUTOCOVARIANCE OF p-SERIES LINEAR PROCESS(Canadian University of Dubai, 2020-12-01) Kamalov, FiruzIn this note, we provide tight boundaries for the autocovariance function of a stochastic linear process with p-series coefficients. © 2020, Canadian University of Dubai. All rights reserved.Item A note on time series differencing(Canadian University of Dubai, 2021-05-11) Kamalov, FiruzDifferencing is one of the key tools time series analysis. It is com-monly used to obtain stationary time series. In this note, we show that the nth difference of a weakly stationary time series is weakly stationary. Similarly we prove that the nth difference of a strictly stationary time series is strictly stationary. We also consider the effect of differencing on the time series auto-covariance. © 2021, Canadian University of Dubai. All rights reserved.Item A survey of blockchain-based solutions for IoTs, VANETs, and FANETs(IGI Global, 2021-06-11) Abdelhafidh, Maroua; Charef, Nadia; Mnaouer, Adel Ben; Chaari, LamiaRecently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc networks (VANETs) and flying ad-hoc networks (FANETs) are specific extensions of MANETs that are drivers of IoT applications. However, IoT is prone to diverse attacks, being branded as the weakest link in the networking chain requiring effective solutions for achieving an acceptable level of security. Blockchain (BC) technology has been identified as an efficient method to remedy IoT security concerns. Therefore, this chapter classifies the attacks targeting IoT, VANETs, and FANETs systems based on their vulnerabilities. This chapter explores a selection of blockchain-based solutions for securing IoT, VANETs, and FANETs and presents open research directions compiled out of the presented solutions as useful guidelines for the readers. © 2021, IGI Global.Item A survey of blockchain-based solutions for IoTs, VANETs, and FANETs(IGI Global, 2022-07-08) Abdelhafidh, Maroua; Charef, Nadia; Mnaouer, Adel Ben; Chaari, LamiaRecently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc networks (VANETs) and flying ad-hoc networks (FANETs) are specific extensions of MANETs that are drivers of IoT applications. However, IoT is prone to diverse attacks, being branded as the weakest link in the networking chain requiring effective solutions for achieving an acceptable level of security. Blockchain (BC) technology has been identified as an efficient method to remedy IoT security concerns. Therefore, this chapter classifies the attacks targeting IoT, VANETs, and FANETs systems based on their vulnerabilities. This chapter explores a selection of blockchain-based solutions for securing IoT, VANETs, and FANETs and presents open research directions compiled out of the presented solutions as useful guidelines for the readers. © 2023, IGI Global. All rights reserved.Item A theoretical distribution analysis of synthetic minority oversampling technique (SMOTE) for imbalanced learning(Springer, 2023) Elreedy, Dina; Atiya, Amir F.; Kamalov, FiruzClass imbalance occurs when the class distribution is not equal. Namely, one class is under-represented (minority class), and the other class has significantly more samples in the data (majority class). The class imbalance problem is prevalent in many real world applications. Generally, the under-represented minority class is the class of interest. The synthetic minority over-sampling technique (SMOTE) method is considered the most prominent method for handling unbalanced data. The SMOTE method generates new synthetic data patterns by performing linear interpolation between minority class samples and their K nearest neighbors. However, the SMOTE generated patterns do not necessarily conform to the original minority class distribution. This paper develops a novel theoretical analysis of the SMOTE method by deriving the probability distribution of the SMOTE generated samples. To the best of our knowledge, this is the first work deriving a mathematical formulation for the SMOTE patterns’ probability distribution. This allows us to compare the density of the generated samples with the true underlying class-conditional density, in order to assess how representative the generated samples are. The derived formula is verified by computing it on a number of densities versus densities computed and estimated empirically. © 2023, The Author(s).Item A visualization approach to multiplicative reasoning and geometric measurement for primary-school students-a pilot study(City University of New York, 2022-12) Jain, Sonal; Leung, Ho-Hon; Kamalov, FiruzUnderstanding the concept of area requires an understanding of the relationship between geometry and multiplication. The multiplicative reasoning required to find the areas of regular figures is used in many courses in elementary mathematical education. This paper explores various methods in which multiplicative reasoning is incorporated into the measurement of area. The main goal is to provide tasks that encourage the application of multiplicative reasoning when students are asked to measure the areas of geometric figures. Student performance is analyzed in two pilot studies of the relationship between geometric measurement and multiplicative reasoning. © 2022 City University of New York. All rights reserved.Item Advanced key distribuation center algorithm (AKDC)(2010) Abuazab, Hussam Hussein; Dahmane, Adel Omar; Hamam, HabibItem AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless Networks(Institute of Electrical and Electronics Engineers Inc., 2021) Charef, Nadia; Mnaouer, Adel Ben; Bouachir, OunsThe vast distribution of low-power devices in IoT applications requires robust communication technologies that ensure high-performance level in terms of QoS, light-weight computation, and security. Advanced wireless technologies (i.e. 5G and 6G) are playing an increasing role in facilitating the deployment of IoT applications. To prolong the network lifetime, energy harvesting is an essential technology in wireless networks. Nevertheless, maintaining energy sustainability is difficult when considering high QoS requirements in IoT. Therefore, an energy management technique that ensures energy efficiency and meets QoS is needed. Energy efficiency in duty cycling solutions needs novel energy management techniques to address these challenges and achieve a trade-off between energy efficiency and delay. Predictive models (i.e., based on AI and ML techniques) represent useful tools that encapsulate the stochastic nature of harvested energy in duty cycle scheduling. The conventional predictive model relies on environmental parameters to estimate the harvested energy. Instead, Artificial Intelligence (AI) allows for recursive prediction models that rely on past behavior of harvested and consumed energy. This is useful to achieve better precision in energy estimation and extend the limit beyond predictive models directed solely for energy sources that exhibit periodic behavior. In this paper, we explore the usage of a ML model to enhance the performance of duty cycle scheduling. The aim is to improve the QoS performance of the proposed solution. To assess the performance of the proposed model, it was simulated using the INET framework of the OMNet++ simulation environment. The results are compared to an enhanced IEEE 802.15.4 MAC protocol from the literature. The results of the comparative study show clear superiority of the proposed AI-based protocol that testified to better use of energy estimation for better management of the duty cycling at the MAC sublayer. © 2021 IEEE.Item An Ensemble-Based Machine Learning Model for Emotion and Mental Health Detection(World Scientific, 2022) Jonnalagadda, Annapurna; Rajvir, Manan; Singh, Shovan; Chandramouliswaran S.; George, Joshua; Kamalov, FiruzRecent studies have highlighted several mental health problems in India, caused by factors such as lack of trained counsellors and a stigma associated with discussing mental health. These challenges have raised an increasing need for alternate methods that can be used to detect a person's emotion and monitor their mental health. Existing research in this field explores several approaches ranging from studying body language to analysing micro-expressions to detect a person's emotions. However, these solutions often rely on techniques that invade people's privacy and thus face challenges with mass adoption. The goal is to build a solution that can detect people's emotions, in a non-invasive manner. This research proposes a journaling web application wherein the users enter their daily reflections. The application extracts the user's typing patterns (keystroke data) and primary phone usage data. It uses this data to train an ensemble machine learning model, which can then detect the user's emotions. The proposed solution has various applications in today's world. People can use it to keep track of their emotions and study their emotional health. Also, any individual family can use this application to detect early signs of anxiety or depression amongst the members. © 2023 World Scientific Publishing Co.Item Arithmetic properties of complex fibonacci numbers and fibonacci quaternions(SAS International Publications, 2021-09) Leung, Ho-Hon; Kamalov, FiruzIn this paper, we investigate certain arithmetic properties of complex Fibonacci numbers and Fibonacci quaternions. More specifically, we look at the divisibility properties of complex Fibonacci numbers and Fibonacci quaternions. Our results make use of some well-known Fibonacci identities. Since quaternions are non-commutative algebra, extra care has been taken to investigate the various divisibility properties of the Fibonacci quaternions. © SAS International Publications.Item Artificial intelligence implication on energy sustainability in Internet of Things: A survey(Elsevier Ltd, 2023-03) Charef, Nadia; Ben Mnaouer, Adel; Aloqaily, Moayad; Bouachir, Ouns; Guizani, MohsenItem Audio steganalysis based on lossless data-compression techniques(Springer Nature Switzerland AG, 2012) Djebbar, Fatiha; Ayad, BeghdadIn this paper, we introduce a new blind steganalysis method that can reliably detect modifications in audio signals due to steganography. Lossless data-compression ratios are computed from the testing signals and their reference versions and used as features for the classifier design. Additionally, we propose to extract additional features from different energy parts of each tested audio signal to retrieve more informative data and enhance the classifier capability. Support Vector Machine (SVM) is employed to discriminate between the cover- and the stego-audio signals. Experimental results show that our method performs very well and achieves very good detection rates of stego-audio signals produced by S-tools4, Steghide and Hide4PGP. © 2012 Springer-Verlag.Item Auditory-based subband blind source separation using sample-by-sample and Infomax algorithms(2010) Salem, Abderraouf Ben; Selouani, Sid Ahmed; Hamam, HabibWe present a new subband decomposition method for the separation of convolutive mixtures of speech. This method uses a sample-by-sample algorithm to perform the subband decomposition by mimicking the processing performed by the human ear. The unknown source signals are separated by maximizing the entropy of a transformed set of signal mixtures through the use of a gradient ascent algorithm. Experimental results show the efficiency of the proposed approach in terms of signal-to-interference ratio. Compared with the fullband method that uses the Infomax algorithm, our method shows an important improvement of the output signal-to-noise ratio when the sensor inputs are severely degraded by additive noise.Item Autism screening: an unsupervised machine learning approach(Springer, 2022-12) Thabtah, Fadi; Spencer, Robinson; Abdelhamid, Neda; Kamalov, Firuz; Wentzel, Carl; Ye, Yongsheng; Dayara, Thanu