Fathy Eassa
YOU?
Author Swipe
View article: Multi-model deep learning for dementia detection: addressing data and model limitations
Multi-model deep learning for dementia detection: addressing data and model limitations Open
Introduction Deep neural network architectures have transformed medical imaging, particularly in structural MRI (sMRI) classification. However, existing state-of-the-art deep learning models face limitations in preprocessing and feature ex…
View article: A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation
A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation Open
Peer-to-peer (P2P) streaming networks are widely used for large-scale multimedia delivery, but they continue to face challenges related to reliability, security, and scalability. To address these issues, we propose a hybrid framework that …
View article: Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design
Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design Open
Botnet attacks on Internet of Things (IoT) devices are escalating at the 5G/6G multi-access edge, yet most federated learning frameworks for IoT malware detection (FL-IMD) still hinge on a central aggregator, enlarging the attack surface, …
View article: Comparative Analysis of SDN and Blockchain Integration in P2P Streaming Networks for Secure and Reliable Communication
Comparative Analysis of SDN and Blockchain Integration in P2P Streaming Networks for Secure and Reliable Communication Open
Rapid advancements in peer-to-peer (P2P) streaming technologies have significantly impacted digital communication, enabling scalable, decentralized, and real-time content distribution. Despite these advancements, challenges persist, includ…
View article: Security of East-West Interface of SDN: A Review of Challenges, Solutions, and Future Directions
Security of East-West Interface of SDN: A Review of Challenges, Solutions, and Future Directions Open
The east-west interface in Software Defined Networking (SDN) plays a crucial role in enabling inter-controller communication, which is vital for scalability, load balancing, and fault tolerance in distributed SDN environments. Despite its …
View article: Outdoor Dataset for Flying a UAV at an Appropriate Altitude
Outdoor Dataset for Flying a UAV at an Appropriate Altitude Open
The increasing popularity of drones for Internet of Things (IoT) applications has led to significant research interest in autonomous navigation within unknown and dynamic environments. Researchers are utilizing supervised learning techniqu…
View article: Enhancing east-west interface security in heterogeneous SDN <i>via</i> blockchain
Enhancing east-west interface security in heterogeneous SDN <i>via</i> blockchain Open
Software defined networking (SDN) increasingly integrates multiple controllers from diverse vendors to enhance network scalability, flexibility, and reliability. However, such heterogeneous deployments pose significant security threats, es…
View article: Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain
Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain Open
IoT environments have introduced diverse logistic support services into our lives and communities, in areas such as education, medicine, transportation, and agriculture. However, with new technologies and services, the issue of privacy and…
View article: Error Classification and Static Detection Methods in Tri-Programming Models: MPI, OpenMP, and CUDA
Error Classification and Static Detection Methods in Tri-Programming Models: MPI, OpenMP, and CUDA Open
The growing adoption of supercomputers across various scientific disciplines, particularly by researchers without a background in computer science, has intensified the demand for parallel applications. These applications are typically deve…
View article: Deep Learning-Based Autonomous Navigation of 5G Drones in Unknown and Dynamic Environments
Deep Learning-Based Autonomous Navigation of 5G Drones in Unknown and Dynamic Environments Open
The flexibility and rapid mobility of drones make them ideal for Internet of Things (IoT) applications, such as traffic control and data collection. Therefore, the autonomous navigation of 5G drones in unknown and dynamic environments has …
View article: RPFL: A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection
RPFL: A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection Open
The proliferation of Internet of Things (IoT) devices and their vulnerability to malware infections pose critical security challenges in IoT networks and multi-access edge computing (MEC). Traditional federated learning-based IoT malware d…
View article: Towards Robust SDN Security: A Comparative Analysis of Oversampling Techniques with ML and DL Classifiers
Towards Robust SDN Security: A Comparative Analysis of Oversampling Techniques with ML and DL Classifiers Open
Software-defined networking (SDN) is becoming a predominant architecture for managing diverse networks. However, recent research has exhibited the susceptibility of SDN architectures to cyberattacks, which increases its security challenges…
View article: A Comprehensive Review of Interoperability Challenges and Applications Beyond Cryptocurrencies
A Comprehensive Review of Interoperability Challenges and Applications Beyond Cryptocurrencies Open
The present study aimed to establish and evaluate the interoperability mechanisms such as sidechains, hashed time-lock contracts (HTLCs), blockchain bridges, smart contracts, and relay chains related to cross-chain communication across var…
View article: Hybrid Resilient Framework for Self-Driving Car
Hybrid Resilient Framework for Self-Driving Car Open
Self-driving cars are expected to become a convenient source of transportation in near future. However, achieving a self-driving car at Level 5 still poses challenges. The challenges could be attributed to maintaining desirable functionali…
View article: Temporal-Logic-Based Testing Tool for Programs Using the Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) Programming Models
Temporal-Logic-Based Testing Tool for Programs Using the Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) Programming Models Open
The recent surge in high-performance computing (HPC) demands, particularly with the advent of Exascale supercomputers, has highlighted the need for robust parallel systems. Achieving such systems involves not only advancements in hardware …
View article: MPJ-SPARK Integration-Based Technique to Enhance Big Data Analytics in High Performance Computing Environments
MPJ-SPARK Integration-Based Technique to Enhance Big Data Analytics in High Performance Computing Environments Open
The explosion of data from various sources such as smartphone applications, sensors, social media, and High-Performance Computing (HPC) simulations, has driven demand for high-performance data analytics. Traditional analytics tools lag HPC…
View article: Automated Models for Predicting Software Defects in Hybrid Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) Parallel Programs Using Deep Learning
Automated Models for Predicting Software Defects in Hybrid Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) Parallel Programs Using Deep Learning Open
Hybrid Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) parallel programs are pivotal for scalability and efficiency in high-performance computing (HPC), especially as systems approach exa-scale operations. These programs…
View article: Defect Detection and Correction in OpenMP: A Static Analysis and Machine Learning-Based Solution
Defect Detection and Correction in OpenMP: A Static Analysis and Machine Learning-Based Solution Open
Concurrency defects such as race conditions, deadlocks, and improper synchronization remain a critical challenge in developing reliable OpenMP-based parallel applications. Traditional static analysis tools often focus only on defect detect…
View article: Code Clone Detection Techniques Based on Large Language Models
Code Clone Detection Techniques Based on Large Language Models Open
Code duplication, commonly known as code cloning, is a persistent challenge in software development. While reusing code fragments boosts productivity, excessive cloning poses challenges to maintenance and elevates the risk of bugs. Therefo…
View article: Multimodal Large Language Model-Based Fault Detection and Diagnosis in Context of Industry 4.0
Multimodal Large Language Model-Based Fault Detection and Diagnosis in Context of Industry 4.0 Open
In this paper, a novel multimodal large language model-based fault detection and diagnosis framework that addresses the limitations of traditional fault detection and diagnosis approaches is proposed. The proposed framework leverages the G…
View article: Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach
Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach Open
Most traditional IP networks face serious security and management challenges due to their rapid increase in complexity. SDN resolves these issues by the separation of control and data planes, hence enabling programmability for centralized …
View article: Multimodal Large Language Model-Based Fault Detection and Diagnosis in Context of Industry 4.0
Multimodal Large Language Model-Based Fault Detection and Diagnosis in Context of Industry 4.0 Open
In this paper, a novel multimodal large language model–based fault detection and diagnosis framework that addresses the limitations of traditional fault detection and diagnosis approaches is proposed. The proposed framework leverages…
View article: A Blockchain-Based Security Framework for East-West Interface of SDN
A Blockchain-Based Security Framework for East-West Interface of SDN Open
Software-Defined Networking (SDN) has emerged as a revolutionary architecture in computer networks, offering comprehensive network control and monitoring capabilities. However, securing the east–west interface, which is crucial for communi…
View article: Temporal-Logic-Based Testing Tool Architecture for Dual-Programming Model Systems
Temporal-Logic-Based Testing Tool Architecture for Dual-Programming Model Systems Open
Today, various applications in different domains increasingly rely on high-performance computing (HPC) to accomplish computations swiftly. Integrating one or more programming models alongside the used programming language enhances system p…