about.jpg

Using Blockchain Technology for the Internet of Vehicles

The Internet of Vehicles (IoV) aims to connect vehicles with their surroundings and share data. In IoV, various wireless technologies like 5G, WIFI, DSRC, WiMAX, and ZigBee are used. To share data within wireless surroundings in a secure way, some security aspects need to be fulfilled. Blockchain technology is a good fit to cover these countermeasures. IoV uses a lot of technologies and interacts with different types of wireless nodes, and this increases the vulnerability to some attacks that could endanger lives. Using blockchain technology within the IoV architecture could provide efficient

Artificial Intelligence

A Multitier Deep Learning Model for Arrhythmia Detection

An electrocardiograph (ECG) is employed as a primary tool for diagnosing cardiovascular diseases (CVDs). ECG signals provide a framework to probe the underlying properties and enhance the initial diagnosis obtained via traditional tools and patient-doctor dialogs. Notwithstanding its proven utility, deciphering large data sets to determine appropriate information remains a challenge in ECG-based CVD diagnosis and treatment. Our study presents a deep neural network (DNN) strategy to ameliorate the aforementioned difficulties. Our strategy consists of a learning stage where classification

Artificial Intelligence

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

Fifth generation (5G)networks aim at utilizing many promising communication technologies, such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a massive number of connected devices with 5G advanced technologies and innovating new techniques will surely bring tremendous challenges for trust, security and privacy. Therefore, secure mechanisms and protocols are required as the basis for 5G networks to address this security challenges and follow security-by-design but also security-by-operations rules. In this context, new efficient cryptographic protocols and

Artificial Intelligence

Performance evaluation of transform domain diagonal principal component analysis for facial recognition employing different pre-processing spatial domain approaches

Facial recognition using spatial domain Diagonal Principal Component Analysis (DiaPCA) algorithm produces better accuracy compared to the Two Dimensional PCA (2DPCA). Transform Domain - 2DPCA (TD2DPCA) retains the high recognition accuracy of the 2DPCA while considerably reducing storage requirements and computational complexity. In this work, the Transform Domain PCA implementation of the DiaPCA (TDDiaPCA) is presented. All the test results, for noise free and noisy images, consistently confirm the considerable storage and computational savings for different spatial domain pre-processing

Artificial Intelligence

A Novel Hadoop Security Model for Addressing Malicious Collusive Workers

With the daily increase of data production and collection, Hadoop is a platform for processing big data on a distributed system. A master node globally manages running jobs, whereas worker nodes process partitions of the data locally. Hadoop uses MapReduce as an effective computing model. However, Hadoop experiences a high level of security vulnerability over hybrid and public clouds. Specially, several workers can fake results without actually processing their portions of the data. Several redundancy-based approaches have been proposed to counteract this risk. A replication mechanism is used

Artificial Intelligence

Advanced methods for missing values imputation based on similarity learning

The real-world data analysis and processing using data mining techniques often are facing observations that contain missing values. The main challenge of mining datasets is the existence of missing values. The missing values in a dataset should be imputed using the imputation method to improve the data mining methods’accuracy and performance. There are existing techniques that use k-nearest neighbors algorithm for imputing the missing values but determining the appropriate k value can be a challenging task. There are other existing imputation techniques that are based on hard clustering

Artificial Intelligence

A Deep Learning Approach for Vehicle Detection

The autonomous driving needs some several features to achieve driving without human interference. One of these features is vehicle classification and detection since the target of this process is to help the CPU ''Central Processing Unit" of the vehicle to see what is around the vehicle, in order to evaluate the situation to take the best decision for each situation in real time. This paper is focusing on the classification process of the video-based vehicle detection, to achieve that, different deep learning techniques have been implemented which are known as convolutional neural networks

Artificial Intelligence

NnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks

Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of

Artificial Intelligence

Content based image retrieval of diabetic macular edema images

Colour fundus images play an important role in diagnosing and screening diabetic macular edema (DME). In rural areas, content-based image retrieval (CBIR) might compensate the lack of expert ophthalmologists. In this work, we present a fully automated CBIR system that retrieves fundus images according to their content (quantity and location) of exudates. First, the macula is divided into three concentric regions whose texture discontinuities are used to represent lesion content of the retina. The image-to-image distance measure gives higher weights to lesions closer to the fovea to reflect the

Artificial Intelligence

Content based image retrieval of diabetic macular edema images

Colour fundus images play an important role in diagnosing and screening diabetic macular edema (DME). In rural areas, content-based image retrieval (CBIR) might compensate the lack of expert ophthalmologists. In this work, we present a fully automated CBIR system that retrieves fundus images according to their content (quantity and location) of exudates. First, the macula is divided into three concentric regions whose texture discontinuities are used to represent lesion content of the retina. The image-to-image distance measure gives higher weights to lesions closer to the fovea to reflect the

Artificial Intelligence