Zag ElSayed
YOU?
Author Swipe
View article: DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability
DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability Open
The denial of service (DoS) and distributed denial of service (DDoS) attacks are considered the most frequent attacks targeting the Internet of Things (IoT) network infrastructure globally. The current approaches for detecting DoS and DDoS…
View article: A Comparative Study of Machine Learning Algorithms for Stock Price Prediction Using Insider Trading Data
A Comparative Study of Machine Learning Algorithms for Stock Price Prediction Using Insider Trading Data Open
The research paper empirically investigates several machine learning algorithms to forecast stock prices depending on insider trading information. Insider trading offers special insights into market sentiment, pointing to upcoming changes …
View article: TemporalAugmenter: An Ensemble Recurrent Based Deep Learning Approach for Signal Classification
TemporalAugmenter: An Ensemble Recurrent Based Deep Learning Approach for Signal Classification Open
Ensemble modeling has been widely used to solve complex problems as it helps to improve overall performance and generalization. In this paper, we propose a novel TemporalAugmenter approach based on ensemble modeling for augmenting the temp…
View article: Adapted Contrastive Predictive Coding Framework for Accessible Smart Home Control System Based on Hand Gestures Recognition
Adapted Contrastive Predictive Coding Framework for Accessible Smart Home Control System Based on Hand Gestures Recognition Open
Smart home control systems have been widely used to control multiple smart home devices such as smart TVs, smart HVAC, and smart bulbs. While targeting the design of a smart home environment, the accessibility of the entire system is cruci…
View article: Not as Simple as It Looked: Are We Concluding for Biased Arrest Practices?
Not as Simple as It Looked: Are We Concluding for Biased Arrest Practices? Open
This study examines racial disparities in violent arrest outcomes, challenging conventional methods through a nuanced analysis of Cincinnati Police Department data. Acknowledging the intricate nature of racial disparity, the study categori…
View article: A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation
A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation Open
The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management. The Global IoT in Healthcare Market value is $252.2 Billion in 2023. However, the rapid involv…
View article: TemporalAugmenter: An Ensemble Recurrent Based Deep Learning Approach for Signal Classification
TemporalAugmenter: An Ensemble Recurrent Based Deep Learning Approach for Signal Classification Open
Ensemble modeling has been widely used to solve complex problems as it helps to improve overall performance and generalization. In this paper, we propose a novel TemporalAugmenter approach based on ensemble modeling for augmenting the temp…
View article: A Comprehensive Analytical Review on Cybercrime in West Africa
A Comprehensive Analytical Review on Cybercrime in West Africa Open
Cybercrime is a growing concern in West Africa due to the increasing use of technology and internet penetration in the region. Legal frameworks are essential for guiding the control of cybercrime. However, the implementation proves challen…
View article: CautionSuicide: A Deep Learning Based Approach for Detecting Suicidal Ideation in Real Time Chatbot Conversation
CautionSuicide: A Deep Learning Based Approach for Detecting Suicidal Ideation in Real Time Chatbot Conversation Open
Suicide is recognized as one of the most serious concerns in the modern society. Suicide causes tragedy that affects countries, communities, and families. There are many factors that lead to suicidal ideations. Early detection of suicidal …
View article: A review on action recognition for accident detection in smart city transportation systems
A review on action recognition for accident detection in smart city transportation systems Open
Accident detection and public traffic safety is a crucial aspect of safe and better community. Monitoring traffic flow in smart cities using different surveillance cameras plays a crucial role in recognizing accidents and alerting first re…
View article: A Secure Open-Source Intelligence Framework For Cyberbullying Investigation
A Secure Open-Source Intelligence Framework For Cyberbullying Investigation Open
Cyberbullying has become a pervasive issue based on the rise of cell phones and internet usage affecting individuals worldwide. This paper proposes an open-source intelligence pipeline using data from Twitter to track keywords relevant to …
View article: Machine Learning Based IoT Adaptive Architecture for Epilepsy Seizure Detection: Anatomy and Analysis
Machine Learning Based IoT Adaptive Architecture for Epilepsy Seizure Detection: Anatomy and Analysis Open
A seizure tracking system is crucial for monitoring and evaluating epilepsy treatments. Caretaker seizure diaries are used in epilepsy care today, but clinical seizure monitoring may miss seizures. Monitoring devices that can be worn may b…
View article: Machine Learning for Early Mental Health Support and Offenders Correction
Machine Learning for Early Mental Health Support and Offenders Correction Open
The effective rehabilitation and supervision of law offenders are vital to promoting community safety and enabling individuals to reintegrate into society. Community supervision presents several challenges for agencies like the Adult Parol…
View article: A Survey of Unsupervised Learning Algorithms for Zero-Day Attacks in Intrusion Detection Systems.
A Survey of Unsupervised Learning Algorithms for Zero-Day Attacks in Intrusion Detection Systems. Open
Intrusion detection systems (IDS) are systems that are used to monitor networks for malicious events, abnormal activities, and policy violations. They are systems that are capable of detecting and classifying network attacks based on behav…
View article: Cyberbullying in Text Content Detection: An Analytical Review
Cyberbullying in Text Content Detection: An Analytical Review Open
Technological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-th…
View article: Deep Learning Approach for Early Stage Lung Cancer Detection
Deep Learning Approach for Early Stage Lung Cancer Detection Open
Lung cancer is the leading cause of death among different types of cancers. Every year, the lives lost due to lung cancer exceed those lost to pancreatic, breast, and prostate cancer combined. The survival rate for lung cancer patients is …
View article: IoT Botnet Detection Using an Economic Deep Learning Model
IoT Botnet Detection Using an Economic Deep Learning Model Open
The rapid progress in technology innovation usage and distribution has increased in the last decade. The rapid growth of the Internet of Things (IoT) systems worldwide has increased network security challenges created by malicious third pa…
View article: A Convolutional-based Model for Early Prediction of Alzheimer's based on the Dementia Stage in the MRI Brain Images
A Convolutional-based Model for Early Prediction of Alzheimer's based on the Dementia Stage in the MRI Brain Images Open
Alzheimer's disease is a degenerative brain disease. Being the primary cause of Dementia in adults and progressively destroys brain memory. Though Alzheimer's disease does not have a cure currently, diagnosing it at an earlier stage will h…
View article: LiteLSTM Architecture Based on Weights Sharing for Recurrent Neural Networks
LiteLSTM Architecture Based on Weights Sharing for Recurrent Neural Networks Open
Long short-term memory (LSTM) is one of the robust recurrent neural network architectures for learning sequential data. However, it requires considerable computational power to learn and implement both software and hardware aspects. This p…
View article: Zydeco-Style Spike Sorting Low Power VLSI Architecture for IoT BCI Implants
Zydeco-Style Spike Sorting Low Power VLSI Architecture for IoT BCI Implants Open
Brain Computer Interface (BCI) has great potential for solving many brain signal analysis limitations, mental disorder resolutions, and restoring missing limb functionality via neural-controlled implants. However, there is no single availa…
View article: Vision-Based American Sign Language Classification Approach via Deep Learning
Vision-Based American Sign Language Classification Approach via Deep Learning Open
Hearing-impaired is the disability of partial or total hearing loss that causes a significant problem for communication with other people in society. American Sign Language (ASL) is one of the sign languages that most commonly used languag…
View article: The Dangerous Combo: Fileless Malware and Cryptojacking
The Dangerous Combo: Fileless Malware and Cryptojacking Open
Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount o…
View article: Early Stage Diabetes Prediction via Extreme Learning Machine
Early Stage Diabetes Prediction via Extreme Learning Machine Open
Diabetes is one of the chronic diseases that has been discovered for decades. However, several cases are diagnosed in their late stages. Every one in eleven of the world's adult population has diabetes. Forty-six percent of people with dia…
View article: Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)
Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web) Open
In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, informa…
View article: LiteLSTM Architecture for Deep Recurrent Neural Networks
LiteLSTM Architecture for Deep Recurrent Neural Networks Open
Long short-term memory (LSTM) is a robust recurrent neural network architecture for learning spatiotemporal sequential data. However, it requires significant computational power for learning and implementing from both software and hardware…
View article: Green IoT System Architecture for Applied Autonomous Network Cybersecurity Monitoring
Green IoT System Architecture for Applied Autonomous Network Cybersecurity Monitoring Open
Network security morning (NSM) is essential for any cybersecurity system, where the average cost of a cyberattack is $1.1 million. No matter how much a system is secure, it will eventually fail without proper and continuous monitoring. No …
View article: Autonomous Low Power IoT System Architecture for Cybersecurity Monitoring
Autonomous Low Power IoT System Architecture for Cybersecurity Monitoring Open
Network security morning (NSM) is essential for any cybersecurity system, where the average cost of a cyber attack is 1.1 million. No matter how secure a system, it will eventually fail without proper and continuous monitoring. No wonder t…
View article: Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model
Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model Open
Internet of Things (IoT) allowed smart homes to improve the quality and the comfort of our daily lives. However, these conveniences introduced several security concerns that increase rapidly. IoT devices, smart home hubs, and gateway raise…
View article: Brain Computer Interface: EEG Signal Preprocessing Issues and Solutions
Brain Computer Interface: EEG Signal Preprocessing Issues and Solutions Open
Brain Computer Interface (BCI) is often directed at mapping, assisting, or repairing human cognitive or sensory-motor functions.Electroencephalogram (EEG) is a non-invasive method of acquisition brain electrical activities.Noises are impur…
View article: Early Prediction of Epilepsy Seizures System based on Artificial Immune BCI System
Early Prediction of Epilepsy Seizures System based on Artificial Immune BCI System Open
Controlling the surrounding world and predicting future events has always seemed like a dream, but that could become a reality using a Brain Computer/Machine Interface (BCI/BMI).Epilepsy is a group of neurological diseases characterized by…