-
Predicting electrode array impedance after one month from cochlear implantation surgery
Authors:
Yousef A. Alohali,
Yassin Abdelsamad,
Tamer Mesallam,
Fida Almuhawas,
Abdulrahman Hagr,
Mahmoud S. Fayed
Abstract:
Sensorineural hearing loss can be treated using Cochlear implantation. After this surgery using the electrode array impedance measurements, we can check the stability of the impedance value and the dynamic range. Deterioration of speech recognition scores could happen because of increased impedance values. Medicines used to do these measures many times during a year after the surgery. Predicting t…
▽ More
Sensorineural hearing loss can be treated using Cochlear implantation. After this surgery using the electrode array impedance measurements, we can check the stability of the impedance value and the dynamic range. Deterioration of speech recognition scores could happen because of increased impedance values. Medicines used to do these measures many times during a year after the surgery. Predicting the electrode impedance could help in taking decisions to help the patient get better hearing. In this research we used a dataset of 80 patients of children who did cochlear implantation using MED-EL FLEX28 electrode array of 12 channels. We predicted the electrode impedance on each channel after 1 month from the surgery date. We used different machine learning algorithms like neural networks and decision trees. Our results indicates that the electrode impedance can be predicted, and the best algorithm is different based on the electrode channel. Also, the accuracy level varies between 66% and 100% based on the electrode channel when accepting an error range between 0 and 3 KO. Further research is required to predict the electrode impedance after three months, six months and one year.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses
Authors:
Sandra Siby,
Ludovic Barman,
Christopher Wood,
Marwan Fayed,
Nick Sullivan,
Carmela Troncoso
Abstract:
Website fingerprinting (WF) is a well-know threat to users' web privacy. New internet standards, such as QUIC, include padding to support defenses against WF. Previous work only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when u…
▽ More
Website fingerprinting (WF) is a well-know threat to users' web privacy. New internet standards, such as QUIC, include padding to support defenses against WF. Previous work only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when users directly browse the web. We confirm previous claims that network-layer padding cannot provide good protection against powerful adversaries capable of observing all traffic traces. We further demonstrate that such padding is ineffective even against adversaries with constraints on traffic visibility and processing power. At the application layer, we show that defenses need to be deployed by both first and third parties, and that they can only thwart traffic analysis in limited situations. We identify challenges to deploy effective WF defenses and provide recommendations to address them.
△ Less
Submitted 15 December, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
Network Generations and the Security Challenge in IoT Applications
Authors:
Mahmoud S. Fayed
Abstract:
Networks exist all around on the planet, and inside the brain of every living organism. On the city streets we see transport networks, inside homes and organizations we see water pi** networks. And in the digital information age we see the rise of the computer networks and the mobile networks and their upgrade from generation to generation. We need networks for efficient sharing of resources and…
▽ More
Networks exist all around on the planet, and inside the brain of every living organism. On the city streets we see transport networks, inside homes and organizations we see water pi** networks. And in the digital information age we see the rise of the computer networks and the mobile networks and their upgrade from generation to generation. We need networks for efficient sharing of resources and as human beings the most valuable thing that we can share along the time from age to age is our data that could represent our knowledge and information represented through text, voice, image, and video. In this paper we provide a quick overview on network generation and IoT applications. Also, we point to the security threats in these generations.
△ Less
Submitted 6 January, 2022;
originally announced January 2022.
-
Modelling of Received Signals in Molecular Communication Systems based machine learning: Comparison of azure machine learning and Python tools
Authors:
Soha Mohamed,
Mahmoud S. Fayed
Abstract:
Molecular communication (MC) implemented on Nano networks has extremely attractive characteristics in terms of energy efficiency, dependability, and robustness. Even though, the impact of incredibly slow molecule diffusion and high variability environments remains unknown. Analysis and designs of communication systems usually rely on develo** mathematical models that describe the communication c…
▽ More
Molecular communication (MC) implemented on Nano networks has extremely attractive characteristics in terms of energy efficiency, dependability, and robustness. Even though, the impact of incredibly slow molecule diffusion and high variability environments remains unknown. Analysis and designs of communication systems usually rely on develo** mathematical models that describe the communication channel. However, the underlying channel models are unknown in some systems, such as MC systems, where chemical signals are used to transfer information. In these cases, a new method to analyze and design is needed. In this paper, we concentrate on one critical aspect of the MC system, modelling MC received signal until time t , and demonstrate that using tools from ML makes it promising to train detectors that can be executed well without any information about the channel model. Machine learning (ML) is one of the intelligent methodologies that has shown promising results in the domain. This paper applies Azure Machine Learning (Azure ML) for flexible pavement maintenance regressions problems and solutions. For prediction, four parameters are used as inputs: the receiver radius, transmitter radius, distance between receiver and transmitter, and diffusion coefficient, while the output is mAP (mean average precision) of the received signal. Azure ML enables algorithms that can learn from data and experiences and accomplish tasks without having to be coded. In the established Azure ML, the regression algorithms such as, boost decision tree regression, Bayesian linear regression, neural network, and decision forest regression are selected. The best performance is chosen as an optimality criterion. Finally, a comparison that shows the potential benefits of Azure ML tool over programmed based tool (Python), used by developers on local PCs, is demonstrated
△ Less
Submitted 19 December, 2021;
originally announced December 2021.
-
Classification of the Chess Endgame problem using Logistic Regression, Decision Trees, and Neural Networks
Authors:
Mahmoud S. Fayed
Abstract:
In this study we worked on the classification of the Chess Endgame problem using different algorithms like logistic regression, decision trees and neural networks. Our experiments indicates that the Neural Networks provides the best accuracy (85%) then the decision trees (79%). We did these experiments using Microsoft Azure Machine Learning as a case-study on using Visual Programming in classifica…
▽ More
In this study we worked on the classification of the Chess Endgame problem using different algorithms like logistic regression, decision trees and neural networks. Our experiments indicates that the Neural Networks provides the best accuracy (85%) then the decision trees (79%). We did these experiments using Microsoft Azure Machine Learning as a case-study on using Visual Programming in classification. Our experiments demonstrates that this tool is powerful and save a lot of time, also it could be improved with more features that increase the usability and reduce the learning curve. We also developed an application for dataset visualization using a new programming language called Ring, our experiments demonstrates that this language have simple design like Python while integrates RAD tools like Visual Basic which is good for GUI development in the open-source world
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS
Authors:
Sudheesh Singanamalla,
Suphanat Chunhapanya,
Marek VavruĊĦa,
Tanya Verma,
Peter Wu,
Marwan Fayed,
Kurtis Heimerl,
Nick Sullivan,
Christopher Wood
Abstract:
The Domain Name System (DNS) is the foundation of a human-usable Internet, responding to client queries for host-names with corresponding IP addresses and records. Traditional DNS is also unencrypted, and leaks user information to network operators. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting traffic and hiding co…
▽ More
The Domain Name System (DNS) is the foundation of a human-usable Internet, responding to client queries for host-names with corresponding IP addresses and records. Traditional DNS is also unencrypted, and leaks user information to network operators. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting traffic and hiding content from on-lookers. However, one of the criticisms of DoT and DoH is brought to bear by the small number of large-scale deployments (e.g., Comcast, Google, Cloudflare): DNS resolvers can associate query contents with client identities in the form of IP addresses. Oblivious DNS over HTTPS(ODoH) safeguards against this problem. In this paper we ask what it would take to make ODoH practical? We describe ODoH, a practical DNS protocol aimed at resolving this issue by both protecting the client's content and identity. We implement and deploy the protocol, and perform measurements to show that ODoH has comparable performance to protocols like DoH and DoT which are gaining widespread adoption, while improving client privacy, making ODoH a practical privacy enhancing replacement for the usage of DNS.
△ Less
Submitted 19 November, 2020;
originally announced November 2020.
-
Quality of Experience from Cache Hierarchies: Keep your low-bitrate close, and high-bitrate closer
Authors:
Wenjie Li,
Sharief M. A. Oteafy,
Marwan Fayed,
Hossam S. Hassanein
Abstract:
Recent studies into streaming media delivery suggest that performance gains from cache hierarchies such as Information-Centric Networks (ICNs) may be negated by Dynamic Adaptive Streaming (DAS), the de facto method for retrieving multimedia content. The bitrate adaptation mechanisms that drive video streaming clash with caching hierarchies in ways that affect users' Quality of Experience (QoE). Ca…
▽ More
Recent studies into streaming media delivery suggest that performance gains from cache hierarchies such as Information-Centric Networks (ICNs) may be negated by Dynamic Adaptive Streaming (DAS), the de facto method for retrieving multimedia content. The bitrate adaptation mechanisms that drive video streaming clash with caching hierarchies in ways that affect users' Quality of Experience (QoE). Cache performance also diminishes as consumers dynamically select content encoded at different bitrates. In this paper we use the evidence to draw a novel insight: in a cache hierarchy for adaptive streaming content, bitrates should be prioritized over or alongside popularity and hit rates. We build on this insight to propose RippleCache as a family of cache placement schemes that safeguard high-bitrate content at the edge and push low-bitrate content into the network core. Doing so reduces contention of cache resources, as well as congestion in the network. To validate RippleCache claims we construct two separate implementations. We design RippleClassic as a benchmark solution that optimizes content placement by maximizing a measure for cache hierarchies shown to have high correlation with QoE. In addition, our lighter-weight RippleFinder is then re-designed with distributed execution for application in large-scale systems. RippleCache performance gains are reinforced by evaluations in NS-3 against state-of-the-art baseline approaches, using standard measures of QoE as defined by the DASH Industry Forum. Measurements show that RippleClassic and RippleFinder deliver content that suffers less oscillation and rebuffering, as well as the highest levels of video quality, indicating overall improvements to QoE.
△ Less
Submitted 22 March, 2019;
originally announced March 2019.
-
General-Purpose Visual Language and Information System with Case-Studies in Develo** Business Applications
Authors:
Mahmoud Samir Fayed
Abstract:
Learning computer programming has been always challenging. Since the sixties of the last century, many researchers developed Visual Programming Languages (VPLs) to help in this regard. In this thesis, ten VPLs were specifically selected, studied, experimented with, and evaluated. A total of fifteen metrics were used to evaluate the tools. Comparisons, classification, and gap analysis were then pre…
▽ More
Learning computer programming has been always challenging. Since the sixties of the last century, many researchers developed Visual Programming Languages (VPLs) to help in this regard. In this thesis, ten VPLs were specifically selected, studied, experimented with, and evaluated. A total of fifteen metrics were used to evaluate the tools. Comparisons, classification, and gap analysis were then presented. A list of requirements for a general-purpose VPL and a guide to help the novice programmer choose the right tool were generated and finally the PWCT (Programming Without Coding Technology, a novel general-purpose visual programming language) is developed and presented. PWCT has been launched as a Sourceforge project, which currently has more than 230,000 downloads for the language and more than 19,500,000 downloads for samples, tutorials and movies. Many business applications and projects are developed using PWCT, Also we developed the Supernova programming language and the Ring programming language using PWCT to prove that it can be used for advanced and large projects. Feedback from developers and results from the studies indicate that PWCT is a very appealing, competitive, and powerful language.
△ Less
Submitted 10 November, 2020; v1 submitted 25 December, 2017;
originally announced December 2017.
-
PWCT: Visual Language for IoT and Cloud Computing Applications and Systems
Authors:
Mahmoud S. Fayed,
Muhammad Al-Qurishi,
Atif Alamri,
Ahmad A. Al-Daraiseh
Abstract:
Develo** IoT, Data Computing and Cloud Computing software requires different programming skills and different programming languages. This cause a problem for many companies and researchers that need to hires many programmers to develop a complete solution. The problem is related directly to the financial cost and the development time which are very important factors to many research projects. In…
▽ More
Develo** IoT, Data Computing and Cloud Computing software requires different programming skills and different programming languages. This cause a problem for many companies and researchers that need to hires many programmers to develop a complete solution. The problem is related directly to the financial cost and the development time which are very important factors to many research projects. In this paper we present and propose the PWCT visual programming tool for develo** IoT, Data Computing and Cloud Computing Applications and Systems without writing textual code directly. Using PWCT increase productivity and provide researchers with one visual programming tool to develop different solutions.
△ Less
Submitted 25 December, 2017;
originally announced December 2017.
-
SNKnock: A free security tool for Facebook users
Authors:
Mahmoud Samir Fayed
Abstract:
The Facebook Social network is very famous and widely used by millions of users all over the world. Facebook comes with high level of usability so users can easily find their friends and connect to them, but there are security issues related to this process where the attacker can make same-site or cross-site profile cloning attacks to get other users data. In this paper we will identify advanced s…
▽ More
The Facebook Social network is very famous and widely used by millions of users all over the world. Facebook comes with high level of usability so users can easily find their friends and connect to them, but there are security issues related to this process where the attacker can make same-site or cross-site profile cloning attacks to get other users data. In this paper we will identify advanced same-site or cross-site profile cloning attacks then we will propose a security solution to these attacks where the user must record a voice message and answer some questions when he sends a friend request to another user, and then the other user will listen to this message before deciding to accept or reject the request. We implemented this solution by develo** new web application called SNKnock which is available as free service.
△ Less
Submitted 14 January, 2017; v1 submitted 18 December, 2016;
originally announced December 2016.
-
Super Event Driven System OOP GUI Design
Authors:
Mahmoud Samir Fayed,
Ehab Aziz Khalil
Abstract:
This article presents a new proposal design of GUI and new technology in programming Namely "Super Technology" which can be applied for supporting the proposal design of GUI
This article presents a new proposal design of GUI and new technology in programming Namely "Super Technology" which can be applied for supporting the proposal design of GUI
△ Less
Submitted 18 December, 2016;
originally announced December 2016.
-
Yields of Projectile Fragments in Sulphur-Emulsion Interactions at 3.7A GeV
Authors:
S. Kamel,
W. Osman,
M. Fayed
Abstract:
This work presents the basic characteristics of singly, doubly and heavily charged projectile fragments (PFs) emitted in inelastic interactions of 32S ions with photo-emulsion nuclei at Dubna energy (3.7A GeV). Our experimental data are compared with the corresponding data for other projectiles at the same incident energy. The study of mean multiplicities of different charged PFs against the proje…
▽ More
This work presents the basic characteristics of singly, doubly and heavily charged projectile fragments (PFs) emitted in inelastic interactions of 32S ions with photo-emulsion nuclei at Dubna energy (3.7A GeV). Our experimental data are compared with the corresponding data for other projectiles at the same incident energy. The study of mean multiplicities of different charged PFs against the projectile mass shows a power-law relationship. The multiplicity distributions of singly and doubly charged PFs have been fitted well with a Gaussian distribution function. The yields of PFs broken up from the interactions of 32S projectile nuclei with different target nuclei are studied. The beam energy dependence in terms of the various order moments is studied as well.
△ Less
Submitted 18 February, 2017; v1 submitted 9 April, 2016;
originally announced April 2016.
-
RemIX: A Distributed Internet Exchange for Remote and Rural Networks
Authors:
William Waites,
James Sweet,
Roger Baig,
Peter Buneman,
Marwan Fayed,
Gordon Hughes,
Michael Fourman,
Richard Simmons
Abstract:
The concept of the IXP, an Ethernet fabric central to the structure of the global Internet, is largely absent from the development of community-driven collaborative network infrastructure. The reasons for this are two-fold. IXPs exist in central, typically urban, environments where strong network infrastructure ensures high levels of connectivity. Between rural and remote regions, where networks a…
▽ More
The concept of the IXP, an Ethernet fabric central to the structure of the global Internet, is largely absent from the development of community-driven collaborative network infrastructure. The reasons for this are two-fold. IXPs exist in central, typically urban, environments where strong network infrastructure ensures high levels of connectivity. Between rural and remote regions, where networks are separated by distance and terrain, no such infrastructure exists. In this paper we present RemIX a distributed IXPs architecture designed for the community network environment. We examine this praxis using an implementation in Scotland, with suggestions for future development and research.
△ Less
Submitted 29 March, 2016;
originally announced March 2016.
-
Mixing Within Patterned Vortex Core
Authors:
Hamid Ait Abderrahmane,
Mohamed Fayed,
Amr Mandour,
Lyes Kadem,
Georgios H. Vatistas,
Hoi Dick Ng
Abstract:
The video shows the flow dynamics within inner and outer regions of a vortex core. The observed phenomena mimic a transport process occurring within the Antarctic vortex. The video shows two distinct regions: a strongly mixed core and broad ring of weakly mixed region extending out the vortex core boundaries. The two regions are separated by a thin layer that isolates the weakly and strongly mix…
▽ More
The video shows the flow dynamics within inner and outer regions of a vortex core. The observed phenomena mimic a transport process occurring within the Antarctic vortex. The video shows two distinct regions: a strongly mixed core and broad ring of weakly mixed region extending out the vortex core boundaries. The two regions are separated by a thin layer that isolates the weakly and strongly mixed regions; this thin layer behaves as barrier to the mixing of the two regions. The video shows that the barriers deplete when a swirl of the vortex core increases and the vortex core espouses a triangular pattern.
△ Less
Submitted 16 October, 2009;
originally announced October 2009.