-
Advancing Roadway Sign Detection with YOLO Models and Transfer Learning
Authors:
Selvia Nafaa,
Hafsa Essam,
Karim Ashour,
Doaa Emad,
Rana Mohamed,
Mohammed Elhenawy,
Huthaifa I. Ashqar,
Abdallah A. Hassan,
Taqwa I. Alhadidi
Abstract:
Roadway signs detection and recognition is an essential element in the Advanced Driving Assistant Systems (ADAS). Several artificial intelligence methods have been used widely among of them YOLOv5 and YOLOv8. In this paper, we used a modified YOLOv5 and YOLOv8 to detect and classify different roadway signs under different illumination conditions. Experimental results indicated that for the YOLOv8…
▽ More
Roadway signs detection and recognition is an essential element in the Advanced Driving Assistant Systems (ADAS). Several artificial intelligence methods have been used widely among of them YOLOv5 and YOLOv8. In this paper, we used a modified YOLOv5 and YOLOv8 to detect and classify different roadway signs under different illumination conditions. Experimental results indicated that for the YOLOv8 model, varying the number of epochs and batch size yields consistent MAP50 scores, ranging from 94.6% to 97.1% on the testing set. The YOLOv5 model demonstrates competitive performance, with MAP50 scores ranging from 92.4% to 96.9%. These results suggest that both models perform well across different training setups, with YOLOv8 generally achieving slightly higher MAP50 scores. These findings suggest that both models can perform well under different training setups, offering valuable insights for practitioners seeking reliable and adaptable solutions in object detection applications.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Automated Pavement Cracks Detection and Classification Using Deep Learning
Authors:
Selvia Nafaa,
Hafsa Essam,
Karim Ashour,
Doaa Emad,
Rana Mohamed,
Mohammed Elhenawy,
Huthaifa I. Ashqar,
Abdallah A. Hassan,
Taqwa I. Alhadidi
Abstract:
Monitoring asset conditions is a crucial factor in building efficient transportation asset management. Because of substantial advances in image processing, traditional manual classification has been largely replaced by semi-automatic/automatic techniques. As a result, automated asset detection and classification techniques are required. This paper proposes a methodology to detect and classify road…
▽ More
Monitoring asset conditions is a crucial factor in building efficient transportation asset management. Because of substantial advances in image processing, traditional manual classification has been largely replaced by semi-automatic/automatic techniques. As a result, automated asset detection and classification techniques are required. This paper proposes a methodology to detect and classify roadway pavement cracks using the well-known You Only Look Once (YOLO) version five (YOLOv5) and version 8 (YOLOv8) algorithms. Experimental results indicated that the precision of pavement crack detection reaches up to 67.3% under different illumination conditions and image sizes. The findings of this study can assist highway agencies in accurately detecting and classifying asset conditions under different illumination conditions. This will reduce the cost and time that are associated with manual inspection, which can greatly reduce the cost of highway asset maintenance.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Random Linear Network Coding for Non-Orthogonal Multiple Access in Multicast Optical Wireless Systems
Authors:
Ahmed Ali Hassan,
Ahmed Adnan Qidan,
Taisir Elgorashi,
Jaafar Elmirghani
Abstract:
Optical Wireless Communication networks (OWC) has emerged as a promising technology that enables high-speed and reliable communication bandwidth for a variety of applications. In this work, we investigated applying Random Linear Network Coding (RLNC) over NOMA-based OWC networks to improve the performance of the proposed high density indoor optical wireless network where users are divided into mul…
▽ More
Optical Wireless Communication networks (OWC) has emerged as a promising technology that enables high-speed and reliable communication bandwidth for a variety of applications. In this work, we investigated applying Random Linear Network Coding (RLNC) over NOMA-based OWC networks to improve the performance of the proposed high density indoor optical wireless network where users are divided into multicast groups, and each group contains users that slightly differ in their channel gains. Moreover, a fixed power allocation strategy is considered to manage interference among these groups and to avoid complexity. The performance of the proposed RLNC-NOMA scheme is evaluated in terms of average bit error rate and ergodic sum rate versus the power allocation ratio factor. The results show that the proposed scheme is more suitable for the considered network compared to the traditional NOMA and orthogonal transmission schemes.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks
Authors:
Abdelmageed Ahmed Hassan,
Mohamed Sayed Hussein,
Ahmed Shehata AboMoustafa,
Sarah Hossam Elmowafy
Abstract:
Network Intrusion Detection Systems (NIDS) are tools or software that are widely used to maintain the computer networks and information systems kee** them secure and preventing malicious traffics from penetrating into them, as they flag when somebody is trying to break into the system. Best effort has been set up on these systems, and the results achieved so far are quite satisfying, however, ne…
▽ More
Network Intrusion Detection Systems (NIDS) are tools or software that are widely used to maintain the computer networks and information systems kee** them secure and preventing malicious traffics from penetrating into them, as they flag when somebody is trying to break into the system. Best effort has been set up on these systems, and the results achieved so far are quite satisfying, however, new types of attacks stand out as the technology of attacks keep evolving, one of these attacks are the attacks based on Generative Adversarial Networks (GAN) that can evade machine learning IDS leaving them vulnerable. This project investigates the impact of the Adversarial Attacks synthesized using real DDoS attacks generated using GANs on the IDS. The objective is to discover how will these systems react towards synthesized attacks. marking the vulnerability and weakness points of these systems so we could fix them.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Exploiting of flux shadowing effect on In$_{x}$Ga$_{1-x}$As asymmetric shell growth for strain and bending engineering in GaAs - In$_{x}$Ga$_{1-x}$As core - shell NW arrays
Authors:
Mahmoud Al Humaidi,
Julian Jakob,
Ali Al Hassan,
Arman Davtyan,
Philipp Schroth,
Ludwig Feigl,
Jesús Herranz,
Dmitri Novikov,
Lutz Geelhaar,
Tilo Baumbach,
Ullrich Pietsch
Abstract:
Here we report on non-uniform shell growth of In(x)Ga(1-x)As onto GaAs nanowire (NW) core by molecular beam epitaxy (MBE). The growth was realized on pre-patterned silicon substrates with pitch size (p) ranging from 0.1 um to 10 um. Considering the preferable bending direction with respect to the MBE cells as well as the layout of the substrate pattern, we are able to modify the strain distributio…
▽ More
Here we report on non-uniform shell growth of In(x)Ga(1-x)As onto GaAs nanowire (NW) core by molecular beam epitaxy (MBE). The growth was realized on pre-patterned silicon substrates with pitch size (p) ranging from 0.1 um to 10 um. Considering the preferable bending direction with respect to the MBE cells as well as the layout of the substrate pattern, we are able to modify the strain distribution along the NW growth axis and the subsequent bending profile. For NW arrays with high number density, the obtained bending profile of the NWs is composed of straight (barely-strained) and bent (strained) segments with different lengths which depend on the pitch size. A precise control of the bent and straight NW segment length provides a recipe to design NW based devices with length selective strain distribution.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Random Linear Network Coding in NOMA Optical Wireless Networks
Authors:
Ahmed A. M. Hassan,
Ahmad Adnan Qidan,
Mansourah K. Aljohani,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
Optical wireless communication (OWC) has the potential to provide high communication speeds that support the massive use of the Internet that is expected in the near future. In OWC, optical access points (APs) are deployed on the celling to serve multiple users. In this context, efficient multiple access schemes are required to share the resources among the users and align multi-user interference.…
▽ More
Optical wireless communication (OWC) has the potential to provide high communication speeds that support the massive use of the Internet that is expected in the near future. In OWC, optical access points (APs) are deployed on the celling to serve multiple users. In this context, efficient multiple access schemes are required to share the resources among the users and align multi-user interference. Recently, non-orthogonal multiple access (NOMA) has been studied to serve multiple users simultaneously using the same resources, while a different power level is allocated to each user. Despite the acceptable performance of NOMA, users might experience a high packet loss due to high noise, which results from the use of successive interference cancelation (SIC). In this work, random linear network coding (RLNC) is proposed to enhance the performance of NOMA in an optical wireless network where users are divided into multicast groups, and each group contains users that slightly differ in their channel gains. Moreover, a fixed power allocation (FPA) strategy is considered among these groups to avoid complexity. The performance of the proposed scheme is evaluated in terms of total packet success probability. The results show that the proposed scheme is more suitable for the network considered compared to other benchmark schemes such as traditional NOMA and orthogonal transmission schemes. Moreover, the total packet success probability is highly affected by the level of power allocated to each group in all the scenarios.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
Hybrid Pointer Networks for Traveling Salesman Problems Optimization
Authors:
Ahmed Stohy,
Heba-Tullah Abdelhakam,
Sayed Ali,
Mohammed Elhenawy,
Abdallah A Hassan,
Mahmoud Masoud,
Sebastien Glaser,
Andry Rakotonirainy
Abstract:
In this work, a novel idea is presented for combinatorial optimization problems, a hybrid network, which results in a superior outcome. We applied this method to graph pointer networks [1], expanding its capabilities to a higher level. We proposed a hybrid pointer network (HPN) to solve the travelling salesman problem trained by reinforcement learning. Furthermore, HPN builds upon graph pointer ne…
▽ More
In this work, a novel idea is presented for combinatorial optimization problems, a hybrid network, which results in a superior outcome. We applied this method to graph pointer networks [1], expanding its capabilities to a higher level. We proposed a hybrid pointer network (HPN) to solve the travelling salesman problem trained by reinforcement learning. Furthermore, HPN builds upon graph pointer networks which is an extension of pointer networks with an additional graph embedding layer. HPN outperforms the graph pointer network in solution quality due to the hybrid encoder, which provides our model with a verity encoding type, allowing our model to converge to a better policy. Our network significantly outperforms the original graph pointer network for small and large-scale problems increasing its performance for TSP50 from 5.959 to 5.706 without utilizing 2opt, Pointer networks, Attention model, and a wide range of models, producing results comparable to highly tuned and specialized algorithms. We make our data, models, and code publicly available [2].
△ Less
Submitted 13 October, 2021; v1 submitted 6 October, 2021;
originally announced October 2021.
-
Determinants of ICT Adoption Among Small Scale Agribusiness Enterprises In Somalia
Authors:
Husein Osman Abdullahi,
Abdikarim Abi Hassan,
Murni Mahmud,
Abdifatah Farah Ali
Abstract:
The use of Information and Communication Technology (ICT) can advance the Agricultural Business sector, particularly in a country seeking opportunities to explore the sector. There is evidence that ICT has made significant contributions to agribusiness because it allows enterprises to manage their operations, and it has major impacts on the business. However, the critical factors that motivate the…
▽ More
The use of Information and Communication Technology (ICT) can advance the Agricultural Business sector, particularly in a country seeking opportunities to explore the sector. There is evidence that ICT has made significant contributions to agribusiness because it allows enterprises to manage their operations, and it has major impacts on the business. However, the critical factors that motivate the adoption of new innovative technology by agribusiness enterprises are underexplored. The literature has indicated ICT adoption among small-scale agribusiness enterprises in Somalia is not fully understood. Nevertheless, this study addresses this gap by investigating the adoption of ICT among small-scale agribusiness enterprises in Somalia. The paper reports the use of the Technology, Organization, Environment (TOE) framework. An online survey has been conducted with random sampling for data collection, with 107 respondents. The respondents are from agribusiness staff and farmers from various agricultural companies in Somalia. After quantitative data analysis, the results indicated that relative advantage, complexity, top management support, and competitive pressure factors are significant contributors to ICT adoption in Somalian agribusiness enterprises, while ICT costs and vendor support are not significantly related to the adoption of ICT in agricultural business. This study concludes that ICT adoption in Somalia is inspired by insight and motivation rather than financial and external support. Understanding these factors leads to a better understanding of ICT adoption in Somalia. Additionally, it enriches the literature about the agriculture business on the African continent
Keywords: Determinants, ICT Adoption, Agribusiness, Small Scale, TOE framework
△ Less
Submitted 24 February, 2021;
originally announced March 2021.
-
Towards FAIR protocols and workflows: The OpenPREDICT case study
Authors:
Remzi Celebi,
Joao Rebelo Moreira,
Ahmed A. Hassan,
Sandeep Ayyar,
Lars Ridder,
Tobias Kuhn,
Michel Dumontier
Abstract:
It is essential for the advancement of science that scientists and researchers share, reuse and reproduce workflows and protocols used by others. The FAIR principles are a set of guidelines that aim to maximize the value and usefulness of research data, and emphasize a number of important points regarding the means by which digital objects are found and reused by others. The question of how to app…
▽ More
It is essential for the advancement of science that scientists and researchers share, reuse and reproduce workflows and protocols used by others. The FAIR principles are a set of guidelines that aim to maximize the value and usefulness of research data, and emphasize a number of important points regarding the means by which digital objects are found and reused by others. The question of how to apply these principles not just to the static input and output data but also to the dynamic workflows and protocols that consume and produce them is still under debate and poses a number of challenges. In this paper we describe our inclusive and overarching approach to apply the FAIR principles to workflows and protocols and demonstrate its benefits. We apply and evaluate our approach on a case study that consists of making the PREDICT workflow, a highly cited drug repurposing workflow, open and FAIR. This includes FAIRification of the involved datasets, as well as applying semantic technologies to represent and store data about the detailed versions of the general protocol, of the concrete workflow instructions, and of their execution traces. A semantic model was proposed to better address these specific requirements and were evaluated by answering competency questions. This semantic model consists of classes and relations from a number of existing ontologies, including Workflow4ever, PROV, EDAM, and BPMN. This allowed us then to formulate and answer new kinds of competency questions. Our evaluation shows the high degree to which our FAIRified OpenPREDICT workflow now adheres to the FAIR principles and the practicality and usefulness of being able to answer our new competency questions.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Correlated nanoscale analysis of the emission from wurtzite versus zincblende (In,Ga)As/GaAs nanowire core-shell quantum wells
Authors:
Jonas Lähnemann,
Megan O. Hill,
Jesús Herranz,
Oliver Marquardt,
Guanhui Gao,
Ali Al Hassan,
Arman Davtyan,
Stephan O. Hruszkewycz,
Martin V. Holt,
Chunyi Huang,
Irene Calvo-Almazán,
Uwe Jahn,
Ullrich Pietsch,
Lincoln J. Lauhon,
Lutz Geelhaar
Abstract:
While the properties of wurtzite GaAs have been extensively studied during the past decade, little is known about the influence of the crystal polytype on ternary (In,Ga)As quantum well structures. We address this question with a unique combination of correlated, spatially-resolved measurement techniques on core-shell nanowires that contain extended segments of both the zincblende and wurtzite pol…
▽ More
While the properties of wurtzite GaAs have been extensively studied during the past decade, little is known about the influence of the crystal polytype on ternary (In,Ga)As quantum well structures. We address this question with a unique combination of correlated, spatially-resolved measurement techniques on core-shell nanowires that contain extended segments of both the zincblende and wurtzite polytypes. Cathodoluminescence hyperspectral imaging reveals a blueshift of the quantum well emission energy by $75\pm15$ meV in the wurtzite polytype segment. Nanoprobe x-ray diffraction and atom probe tomography enable $\mathbf{k}\cdot\mathbf{p}$ calculations for the specific sample geometry to reveal two comparable contributions to this shift. First, there is a 30% drop in In mole fraction going from the zincblende to the wurtzite segment. Second, the quantum well is under compressive strain, which has a much stronger impact on the hole ground state in the wurtzite than in the zincblende segment. Our results highlight the role of the crystal structure in tuning the emission of (In,Ga)As quantum wells and pave the way to exploit the possibilities of three-dimensional bandgap engineering in core-shell nanowire heterostructures. At the same time, we have demonstrated an advanced characterization toolkit for the investigation of semiconductor nanostructures.
△ Less
Submitted 8 August, 2019; v1 submitted 18 March, 2019;
originally announced March 2019.
-
Toward Refactoring of DMARF and GIPSY Case Studies -- a Team 4 SOEN6471-S14 Project Report
Authors:
Afshin Somani,
Ahmad Al-Sheikh Hassan,
Anurag Reddy Pedditi,
Challa Sai Sukesh Reddy,
Vijay Nag Ranga,
Saravanan Iyyaswamy Srinivasan,
Hongyo Lao,
Zhu Zhili
Abstract:
Software Quality is a major concern in software engineering development in order to be competitive. Such a quality can be achieved by a possible technique called Refactoring where the systems external behavior of the system is not changed. Initially we present our work by analyzing the case studies of ongoing researches of DMARF and GIPSY by understanding their needs and requirements involving the…
▽ More
Software Quality is a major concern in software engineering development in order to be competitive. Such a quality can be achieved by a possible technique called Refactoring where the systems external behavior of the system is not changed. Initially we present our work by analyzing the case studies of ongoing researches of DMARF and GIPSY by understanding their needs and requirements involving the major components in their respective systems. Later sections illustrate the conceptual architecture of these case studies, for this we have referenced the original architecture to draw the important candidate concepts presented in the system, and analyzing their associations with other concepts in the system and then compared this conceptual architecture with the original architectures. Later the document throws light on identifying the code smells exist in the architectures to find them and resolve to minimize the deeper problems. JDeodorant, SonarQube are the tools which we go across for identification and analyzing the source code quality, both these tools are available as an IDE plugin or as an open source platforms. Next is to identify the design patterns exist in the architectures along with their importance and need for existence in respective systems. Finally, the implication is towards introducing refactoring methods onto the smells which have been identified and possibly refactor them accordingly by applying appropriate refactoring methods and showcasing the respective tests to ensure that changes in the architecture does not change the behavior much.
△ Less
Submitted 23 December, 2014;
originally announced December 2014.