-
AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments
Authors:
Mohammed Ashfaaq M. Farzaan,
Mohamed Chahine Ghanem,
Ayman El-Hajjar,
Deepthi N. Ratnayake
Abstract:
The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies. Recognising the need for an automated and precise response to cyber threats, this research explores the application of AI and ML and proposes an AI-powered cyber incident response system for cloud environments. This system, encompassing Network Traffic Classification, Web Int…
▽ More
The escalating sophistication and volume of cyber threats in cloud environments necessitate a paradigm shift in strategies. Recognising the need for an automated and precise response to cyber threats, this research explores the application of AI and ML and proposes an AI-powered cyber incident response system for cloud environments. This system, encompassing Network Traffic Classification, Web Intrusion Detection, and post-incident Malware Analysis (built as a Flask application), achieves seamless integration across platforms like Google Cloud and Microsoft Azure. The findings from this research highlight the effectiveness of the Random Forest model, achieving an accuracy of 90% for the Network Traffic Classifier and 96% for the Malware Analysis Dual Model application. Our research highlights the strengths of AI-powered cyber security. The Random Forest model excels at classifying cyber threats, offering an efficient and robust solution. Deep learning models significantly improve accuracy, and their resource demands can be managed using cloud-based TPUs and GPUs. Cloud environments themselves provide a perfect platform for hosting these AI/ML systems, while container technology ensures both efficiency and scalability. These findings demonstrate the contribution of the AI-led system in guaranteeing a robust and scalable cyber incident response solution in the cloud.
△ Less
Submitted 10 April, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Learning Better Representations From Less Data For Propositional Satisfiability
Authors:
Mohamed Ghanem,
Frederik Schmitt,
Julian Siber,
Bernd Finkbeiner
Abstract:
Training neural networks on NP-complete problems typically demands very large amounts of training data and often needs to be coupled with computationally expensive symbolic verifiers to ensure output correctness. In this paper, we present NeuRes, a neuro-symbolic approach to address both challenges for propositional satisfiability, being the quintessential NP-complete problem. By combining certifi…
▽ More
Training neural networks on NP-complete problems typically demands very large amounts of training data and often needs to be coupled with computationally expensive symbolic verifiers to ensure output correctness. In this paper, we present NeuRes, a neuro-symbolic approach to address both challenges for propositional satisfiability, being the quintessential NP-complete problem. By combining certificate-driven training and expert iteration, our model learns better representations than models trained for classification only, with a much higher data efficiency -- requiring orders of magnitude less training data. NeuRes employs propositional resolution as a proof system to generate proofs of unsatisfiability and to accelerate the process of finding satisfying truth assignments, exploring both possibilities in parallel. To realize this, we propose an attention-based architecture that autoregressively selects pairs of clauses from a dynamic formula embedding to derive new clauses. Furthermore, we employ expert iteration whereby model-generated proofs progressively replace longer teacher proofs as the new ground truth. This enables our model to reduce a dataset of proofs generated by an advanced solver by ~32% after training on it with no extra guidance. This shows that NeuRes is not limited by the optimality of the teacher algorithm owing to its self-improving workflow. We show that our model achieves far better performance than NeuroSAT in terms of both correctly classified and proven instances.
△ Less
Submitted 29 May, 2024; v1 submitted 13 February, 2024;
originally announced February 2024.
-
A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response
Authors:
Herbert Maosa,
Karim Ouazzane,
Mohamed Chahine Ghanem
Abstract:
Intrusion detection systems perform post-compromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analysed and triaged by security analysts. This process is largely manual, tedious and time-consuming. Alert correlation is a technique that tries to reduce the number of intrusion…
▽ More
Intrusion detection systems perform post-compromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analysed and triaged by security analysts. This process is largely manual, tedious and time-consuming. Alert correlation is a technique that tries to reduce the number of intrusion alerts by aggregating those that are related in some way. However, the correlation is performed outside the IDS through third-party systems and tools, after the high volume of alerts has already been raised. These other third-party systems add to the complexity of security operations. In this paper, we build on the very researched area of correlation techniques by develo** a novel hierarchical event correlation model that promises to reduce the number of alerts issued by an Intrusion Detection System. This is achieved by correlating the events before the IDS classifies them. The proposed model takes the best of features from similarity and graph-based correlation techniques to deliver an ensemble capability not possible by either approach separately. Further, we propose a correlation process for correlation of events rather than alerts as is the case in current art. We further develop our own correlation and clustering algorithm which is tailor-made to the correlation and clustering of network event data. The model is implemented as a proof of concept with experiments run on the DARPA 99 Intrusion detection set. The correlation achieved 87 percent data reduction through aggregation, producing nearly 21000 clusters in about 30 seconds.
△ Less
Submitted 9 December, 2023; v1 submitted 2 December, 2023;
originally announced December 2023.
-
A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response
Authors:
Dipo Dunsin,
Mohamed C. Ghanem,
Karim Ouazzane,
Vassil Vassilev
Abstract:
In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes…
▽ More
In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes beyond a simple survey and review. The goal is to look closely at how AI and ML techniques are used in digital forensics and incident response. This research explores cutting-edge research initiatives that cross domains such as data collection and recovery, the intricate reconstruction of cybercrime timelines, robust big data analysis, pattern recognition, safeguarding the chain of custody, and orchestrating responsive strategies to hacking incidents. This endeavour digs far beneath the surface to unearth the intricate ways AI-driven methodologies are sha** these crucial facets of digital forensics practice. While the promise of AI in digital forensics is evident, the challenges arising from increasing database sizes and evolving criminal tactics necessitate ongoing collaborative research and refinement within the digital forensics profession. This study examines the contributions, limitations, and gaps in the existing research, shedding light on the potential and limitations of AI and ML techniques. By exploring these different research areas, we highlight the critical need for strategic planning, continual research, and development to unlock AI's full potential in digital forensics and incident response. Ultimately, this paper underscores the significance of AI and ML integration in digital forensics, offering insights into their benefits, drawbacks, and broader implications for tackling modern cyber threats.
△ Less
Submitted 3 December, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
Authors:
Mohamed Chahine Ghanem,
Patrick Mulvihill,
Karim Ouazzane,
Ramzi Djemai,
Dipo Dunsin
Abstract:
The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web fo…
▽ More
The use of the un-indexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade. The dark web is an in-famously dangerous place where all kinds of criminal activities take place [1-2], despite advances in web forensics techniques, tools, and methodologies, few studies have formally tackled the dark and deep web forensics and the technical differences in terms of investigative techniques and artefacts identification and extraction. This research proposes a novel and comprehensive protocol to guide and assist digital forensics professionals in investigating crimes committed on or via the deep and dark web, The protocol named D2WFP establishes a new sequential approach for performing investigative activities by observing the order of volatility and implementing a systemic approach covering all browsing related hives and artefacts which ultimately resulted into improv-ing the accuracy and effectiveness. Rigorous quantitative and qualitative research has been conducted by assessing D2WFP following a scientifically-sound and comprehensive process in different scenarios and the obtained results show an apparent increase in the number of artefacts re-covered when adopting D2WFP which outperform any current industry or opensource browsing forensics tools. The second contribution of D2WFP is the robust formulation of artefact correlation and cross-validation within D2WFP which enables digital forensics professionals to better document and structure their analysis of host-based deep and dark web browsing artefacts.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance
Authors:
Mohamed C. Ghanem,
Thomas M. Chen,
Mohamed A. Ferrag,
Mohyi E. Kettouche
Abstract:
The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomo…
▽ More
The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomous tools and systems, security compliance remains highly repetitive and resources consuming. In this paper, we proposed a novel method to tackle the ever-growing problem of efficiency and effectiveness in network infrastructures security auditing by formally introducing, designing, and develo** an Expert-System Automated Security Compliance Framework (ESASCF) that enables industrial and open-source VA and PT tools and systems to extract, process, store and re-use the expertise in a human-expert way to allow direct application in similar scenarios or during the periodic re-testing. The implemented model was then integrated within the ESASCF and tested on different size networks and proved efficient in terms of time-efficiency and testing effectiveness allowing ESASCF to take over autonomously the SC in Re-testing and offloading Expert by automating repeated segments SC and thus enabling Experts to prioritize important tasks in Ad-Hoc compliance tests. The obtained results validate the performance enhancement notably by cutting the time required for an expert to 50% in the context of typical corporate networks first SC and 20% in re-testing, representing a significant cost-cutting. In addition, the framework allows a long-term impact illustrated in the knowledge extraction, generalization, and re-utilization, which enables better SC confidence independent of the human expert skills, coverage, and wrong decisions resulting in impactful false negatives.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
StegoHound: A Novel Multi-Approaches Method for Efficient and Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files
Authors:
Mohamed C. Ghanem,
Maider D. Uribarri,
Ramzi Djemai,
Dipo Dunsin,
Istteffanny I. Araujo
Abstract:
Anti-forensics techniques particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice. This paper advances the automation of hidden evidence extraction in the context of audio files by proposing a novel multi-approaches method which enables the correlation between unprocessed artefacts, indexed and live forensics analysis…
▽ More
Anti-forensics techniques particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice. This paper advances the automation of hidden evidence extraction in the context of audio files by proposing a novel multi-approaches method which enables the correlation between unprocessed artefacts, indexed and live forensics analysis and traditional Steganographic and Cryptographic detection techniques. In this work, we opted for experimental research methodology in the form of a quantitative analysis of the efficiency of the proposed automation detecting and extracting hidden artefacts in WAV and MP3 audio files by comparing it to standard industry systems. This work advances the current automation in extracting evidence hidden by Cryptographic and Steganographic techniques during forensics investigations, the proposed multi-approaches demonstrated a clear enhancement in terms of coverage and accuracy notably on large audio files (MP3 and WAV) for which the manual forensics analysis is complex, time-consuming and requires significant expertise. Nonetheless, the proposed multi-approach automation may occasionally produce false positives (detecting steganography where none exists) or false negatives (failing to detect steganography that is present) but overall achieve a good balance between efficiently and effectively detecting hidden evidence and minimising the false negative which validates its reliability.
△ Less
Submitted 10 December, 2023; v1 submitted 14 July, 2023;
originally announced July 2023.
-
Network Coding Power Control Mechanisms for Time Varying Channels
Authors:
Samah A. M. Ghanem
Abstract:
In this paper, we propose a model for large scale fading channels via markov process. We exploit the channel delay profile and the dependency between channel states via a first order autoregressive model that cast insight to the channel variations under fading and the closed form delay induced. We propose a network-coding structure that can be employed to compensate for the channel variations unde…
▽ More
In this paper, we propose a model for large scale fading channels via markov process. We exploit the channel delay profile and the dependency between channel states via a first order autoregressive model that cast insight to the channel variations under fading and the closed form delay induced. We propose a network-coding structure that can be employed to compensate for the channel variations under fixed power and to the period of zero packet transmissions under adaptive power control. Satellite communications is an application to the model proposed.
△ Less
Submitted 5 January, 2023;
originally announced April 2023.
-
Information Theoretic I-MMSE generalize Time-Frequency Signal Processing Tools
Authors:
Samah A. M. Ghanem
Abstract:
In this paper, we capitalize on information theoretic-estimation theoretic result, called the I-MMSE [1]-[2] to show that such tool generalizes time-frequency signal processing tools urgent for the analysis of non-stationary non-Gaussian signals.
In this paper, we capitalize on information theoretic-estimation theoretic result, called the I-MMSE [1]-[2] to show that such tool generalizes time-frequency signal processing tools urgent for the analysis of non-stationary non-Gaussian signals.
△ Less
Submitted 5 January, 2023;
originally announced March 2023.
-
Detection of road traffic crashes based on collision estimation
Authors:
Mohamed Essam,
Nagia M. Ghanem,
Mohamed A. Ismail
Abstract:
This paper introduces a framework based on computer vision that can detect road traffic crashes (RCTs) by using the installed surveillance/CCTV camera and report them to the emergency in real-time with the exact location and time of occurrence of the accident. The framework is built of five modules. We start with the detection of vehicles by using YOLO architecture; The second module is the tracki…
▽ More
This paper introduces a framework based on computer vision that can detect road traffic crashes (RCTs) by using the installed surveillance/CCTV camera and report them to the emergency in real-time with the exact location and time of occurrence of the accident. The framework is built of five modules. We start with the detection of vehicles by using YOLO architecture; The second module is the tracking of vehicles using MOSSE tracker, Then the third module is a new approach to detect accidents based on collision estimation. Then the fourth module for each vehicle, we detect if there is a car accident or not based on the violent flow descriptor (ViF) followed by an SVM classifier for crash prediction. Finally, in the last stage, if there is a car accident, the system will send a notification to the emergency by using a GPS module that provides us with the location, time, and date of the accident to be sent to the emergency with the help of the GSM module. The main objective is to achieve higher accuracy with fewer false alarms and to implement a simple system based on pipelining technique.
△ Less
Submitted 26 July, 2022;
originally announced July 2022.
-
Breaking the De-Pois Poisoning Defense
Authors:
Alaa Anani,
Mohamed Ghanem,
Lotfy Abdel Khaliq
Abstract:
Attacks on machine learning models have been, since their conception, a very persistent and evasive issue resembling an endless cat-and-mouse game. One major variant of such attacks is poisoning attacks which can indirectly manipulate an ML model. It has been observed over the years that the majority of proposed effective defense models are only effective when an attacker is not aware of them bein…
▽ More
Attacks on machine learning models have been, since their conception, a very persistent and evasive issue resembling an endless cat-and-mouse game. One major variant of such attacks is poisoning attacks which can indirectly manipulate an ML model. It has been observed over the years that the majority of proposed effective defense models are only effective when an attacker is not aware of them being employed. In this paper, we show that the attack-agnostic De-Pois defense is hardly an exception to that rule. In fact, we demonstrate its vulnerability to the simplest White-Box and Black-Box attacks by an attacker that knows the structure of the De-Pois defense model. In essence, the De-Pois defense relies on a critic model that can be used to detect poisoned data before passing it to the target model. In our work, we break this poison-protection layer by replicating the critic model and then performing a composed gradient-sign attack on both the critic and target models simultaneously -- allowing us to bypass the critic firewall to poison the target model.
△ Less
Submitted 3 April, 2022;
originally announced April 2022.
-
FLoBC: A Decentralized Blockchain-Based Federated Learning Framework
Authors:
Mohamed Ghanem,
Fadi Dawoud,
Habiba Gamal,
Eslam Soliman,
Hossam Sharara,
Tamer El-Batt
Abstract:
The rapid expansion of data worldwide invites the need for more distributed solutions in order to apply machine learning on a much wider scale. The resultant distributed learning systems can have various degrees of centralization. In this work, we demonstrate our solution FLoBC for building a generic decentralized federated learning system using blockchain technology, accommodating any machine lea…
▽ More
The rapid expansion of data worldwide invites the need for more distributed solutions in order to apply machine learning on a much wider scale. The resultant distributed learning systems can have various degrees of centralization. In this work, we demonstrate our solution FLoBC for building a generic decentralized federated learning system using blockchain technology, accommodating any machine learning model that is compatible with gradient descent optimization. We present our system design comprising the two decentralized actors: trainer and validator, alongside our methodology for ensuring reliable and efficient operation of said system. Finally, we utilize FLoBC as an experimental sandbox to compare and contrast the effects of trainer-to-validator ratio, reward-penalty policy, and model synchronization schemes on the overall system performance, ultimately showing by example that a decentralized federated learning system is indeed a feasible alternative to more centralized architectures.
△ Less
Submitted 6 October, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Binary Image Skeletonization Using 2-Stage U-Net
Authors:
Mohamed A. Ghanem,
Alaa A. Anani
Abstract:
Object Skeletonization is the process of extracting skeletal, line-like representations of shapes. It provides a very useful tool for geometric shape understanding and minimal shape representation. It also has a wide variety of applications, most notably in anatomical research and activity detection. Several mathematical algorithmic approaches have been developed to solve this problem, and some of…
▽ More
Object Skeletonization is the process of extracting skeletal, line-like representations of shapes. It provides a very useful tool for geometric shape understanding and minimal shape representation. It also has a wide variety of applications, most notably in anatomical research and activity detection. Several mathematical algorithmic approaches have been developed to solve this problem, and some of them have been proven quite robust. However, a lesser amount of attention has been invested into deep learning solutions for it. In this paper, we use a 2-stage variant of the famous U-Net architecture to split the problem space into two sub-problems: shape minimization and corrective skeleton thinning. Our model produces results that are visually much better than the baseline SkelNetOn model. We propose a new metric, M-CCORR, based on normalized correlation coefficients as an alternative to F1 for this challenge as it solves the problem of class imbalance, managing to recognize skeleton similarity without suffering from F1's over-sensitivity to pixel-shifts.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
On Theoretical Complexity and Boolean Satisfiability
Authors:
Mohamed Ghanem,
Dauod Siniora
Abstract:
Theoretical complexity is a vital subfield of computer science that enables us to mathematically investigate computation and answer many interesting queries about the nature of computational problems. It provides theoretical tools to assess time and space requirements of computations along with assessing the difficultly of problems - classifying them accordingly. It also garners at its core one of…
▽ More
Theoretical complexity is a vital subfield of computer science that enables us to mathematically investigate computation and answer many interesting queries about the nature of computational problems. It provides theoretical tools to assess time and space requirements of computations along with assessing the difficultly of problems - classifying them accordingly. It also garners at its core one of the most important problems in mathematics, namely, the $\textbf{P vs. NP}$ millennium problem. In essence, this problem asks whether solution and verification reside on two different levels of difficulty. In this thesis, we introduce some of the most central concepts in the Theory of Computing, giving an overview of how computation can be abstracted using Turing machines. Further, we introduce the two most famous problem complexity classes $\textbf{P}$ and $\textbf{NP}$ along with the relationship between them. In addition, we explicate the concept of problem reduction and how it is an essential tool for making hardness comparisons between different problems. Later, we present the problem of Boolean Satisfiability (SAT) which lies at the center of NP-complete problems. We then explore some of its tractable as well as intractable variants such as Horn-SAT and 3-SAT, respectively. Last but not least, we establish polynomial-time reductions from 3-SAT to some of the famous NP-complete graph problems, namely, Clique Finding, Hamiltonian Cycle Finding, and 3-Coloring.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
Clique percolation method: memory efficient almost exact communities
Authors:
Alexis Baudin,
Maximilien Danisch,
Sergey Kirgizov,
Clémence Magnien,
Marwan Ghanem
Abstract:
Automatic detection of relevant groups of nodes in large real-world graphs, i.e. community detection, has applications in many fields and has received a lot of attention in the last twenty years. The most popular method designed to find overlap** communities (where a node can belong to several communities) is perhaps the clique percolation method (CPM). This method formalizes the notion of commu…
▽ More
Automatic detection of relevant groups of nodes in large real-world graphs, i.e. community detection, has applications in many fields and has received a lot of attention in the last twenty years. The most popular method designed to find overlap** communities (where a node can belong to several communities) is perhaps the clique percolation method (CPM). This method formalizes the notion of community as a maximal union of $k$-cliques that can be reached from each other through a series of adjacent $k$-cliques, where two cliques are adjacent if and only if they overlap on $k-1$ nodes. Despite much effort CPM has not been scalable to large graphs for medium values of $k$.
Recent work has shown that it is possible to efficiently list all $k$-cliques in very large real-world graphs for medium values of $k$. We build on top of this work and scale up CPM. In cases where this first algorithm faces memory limitations, we propose another algorithm, CPMZ, that provides a solution close to the exact one, using more time but less memory.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Topology optimization of nonlinear periodically microstructured materials for tailored homogenized constitutive properties
Authors:
Reza Behrou,
Maroun Abi Ghanem,
Brianna C. Macnider,
Vimarsh Verma,
Ryan Alvey,
**ho Hong,
Ashley F. Emery,
Hyunsun Alicia Kim,
Nicholas Boechler
Abstract:
A topology optimization method is presented for the design of periodic microstructured materials with prescribed homogenized nonlinear constitutive properties over finite strain ranges. The mechanical model assumes linear elastic isotropic materials, geometric nonlinearity at finite strain, and a quasi-static response. The optimization problem is solved by a nonlinear programming method and the se…
▽ More
A topology optimization method is presented for the design of periodic microstructured materials with prescribed homogenized nonlinear constitutive properties over finite strain ranges. The mechanical model assumes linear elastic isotropic materials, geometric nonlinearity at finite strain, and a quasi-static response. The optimization problem is solved by a nonlinear programming method and the sensitivities computed via the adjoint method. Two-dimensional structures identified using this optimization method are additively manufactured and their uniaxial tensile strain response compared with the numerically predicted behavior. The optimization approach herein enables the design and development of lattice-like materials with prescribed nonlinear effective properties, for use in myriad potential applications, ranging from stress wave and vibration mitigation to soft robotics.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
Interoperable Framework to Enhance Citizen Services in the Kingdom of Bahrain
Authors:
Mohammed Ghanem,
Ali Alsoufi
Abstract:
Citizen records are scattered between different state organizations. It wastes time, effort, and resources for both citizen and organization to collect, maintain, and update records to fulfill citizen services. Interoperability is a key element that enables seamless collaboration between different entities. It requires non-conventional methods to overcome interoperability challenges such as lack o…
▽ More
Citizen records are scattered between different state organizations. It wastes time, effort, and resources for both citizen and organization to collect, maintain, and update records to fulfill citizen services. Interoperability is a key element that enables seamless collaboration between different entities. It requires non-conventional methods to overcome interoperability challenges such as lack of trust, centralization, and policy and technology differences. Blockchain is a disruptive technology with the potential to overcome these challenges. The technology designed to enable peer-to-peer transactions with elimination of intermediary in a trustless environment through the control of consensus mechanisms. This research aims to explore the status of interoperability in Bahrain, design an interoperable framework, and then test the validity of the framework by implementation of a prototype using blockchain technology. The research will be divided into four phases; I: Information collection, II: Design and modeling the framework, III: Implementation of a prototype, and Phase IV: Measuring the performance of the prototype. This research is in progress and it is expected, once is it complete, to enhance the e-government's plan in the Kingdom of Bahrain to provide better services to citizens and help in the transition from e-government to seamless government, which will lead to sustainable citizen services. On the other hand, the findings of the study is expected to improve the social, economical, and environmental sustainability by the increase in process optimization, reduction of cost and complexity.
△ Less
Submitted 10 May, 2020;
originally announced May 2020.
-
MIMO Mutli-Cell Processing: Optimal Precoding and Power Allocation
Authors:
Samah A. M. Ghanem
Abstract:
We investigate the optimal power allocation and optimal precoding for a cluster of two BSs which cooperate to jointly maximize the achievable rate for two users connecting to each BS in a MCP framework. This framework is modeled by a virtual network MIMO channel due to the framework of full cooperation. In particular, due to sharing the CSI and data between the two BSs over the backhaul link. We p…
▽ More
We investigate the optimal power allocation and optimal precoding for a cluster of two BSs which cooperate to jointly maximize the achievable rate for two users connecting to each BS in a MCP framework. This framework is modeled by a virtual network MIMO channel due to the framework of full cooperation. In particular, due to sharing the CSI and data between the two BSs over the backhaul link. We provide a generalized fixed point equation of the optimal precoder in the asymptotic regimes of the low- and high-snr. We introduce a new iterative approach that leads to a closed-form expression for the optimal precoding matrix in the high-snr regime which is known to be an NP-hard problem. Two MCP distributed algorithms have been introduced, a power allocation algorithm for the UL, and a precoding algorithm for the DL.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Network Coded Handover in IEEE 802.11
Authors:
Samah A. M. Ghanem
Abstract:
We propose a network coded handover of a station moving between two IEEE 802.11 access points (AP). To address such novel proposed framework on a small cell WiFi to WiFi AP handoff, we propose a novel model for the Distributed Coordination Function (DCF) of the WiFi IEEE 802.11 with fixed average contention window. We provide a single packet tranmission model which has been extended to N-packets t…
▽ More
We propose a network coded handover of a station moving between two IEEE 802.11 access points (AP). To address such novel proposed framework on a small cell WiFi to WiFi AP handoff, we propose a novel model for the Distributed Coordination Function (DCF) of the WiFi IEEE 802.11 with fixed average contention window. We provide a single packet tranmission model which has been extended to N-packets transmission models with and without fragmentation. We also model the N-packet transmission for the uncoded/coded packets broadcast in order to compare the IEEE 802.11 unreliable to reliable coded broadcast with ACK. We analyze the delay over all, unicast and broadcast transmissions, for the scenario considered with a topology with one WiFi AP before the handover. Capitalizing on the set of models and their corresponding mean completion times (delay), we analyze the performance of different mechanisms. Finally, we provide a novel formulation of the Network Coding on the Edge handover when the station is mobile allowing for the derivation of optimal transmission strategies that can define an optimal time, when to switch to the other AP.
△ Less
Submitted 10 September, 2018;
originally announced September 2018.
-
Piggybacking Codes for Network Coding: The High/Low SNR Regime
Authors:
Samah A. M. Ghanem
Abstract:
We propose a piggybacking scheme for network coding where strong source inputs piggyback the weaker ones, a scheme necessary and sufficient to achieve the cut-set upper bound at high/low-snr regime, a new asymptotically optimal operational regime for the multihop Amplify and Forward (AF) networks.
We propose a piggybacking scheme for network coding where strong source inputs piggyback the weaker ones, a scheme necessary and sufficient to achieve the cut-set upper bound at high/low-snr regime, a new asymptotically optimal operational regime for the multihop Amplify and Forward (AF) networks.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
Network Coding Channel Virtualization Schemes for Satellite Multicast Communications
Authors:
Samah A. M. Ghanem,
Ala Eddine Gharsellaoui,
Daniele Tarchi,
Alessandro Vanelli-Coralli
Abstract:
In this paper, we propose two novel schemes to solve the problem of finding a quasi-optimal number of coded packets to multicast to a set of independent wireless receivers suffering different channel conditions. In particular, we propose two network channel virtualization schemes that allow for representing the set of intended receivers in a multicast group to be virtualized as one receiver. Such…
▽ More
In this paper, we propose two novel schemes to solve the problem of finding a quasi-optimal number of coded packets to multicast to a set of independent wireless receivers suffering different channel conditions. In particular, we propose two network channel virtualization schemes that allow for representing the set of intended receivers in a multicast group to be virtualized as one receiver. Such approach allows for a transmission scheme not only adapted to per-receiver channel variation over time, but to the network-virtualized channel representing all receivers in the multicast group. The first scheme capitalizes on a maximum erasure criterion introduced via the creation of a virtual worst per receiver per slot reference channel of the network. The second scheme capitalizes on a maximum completion time criterion by the use of the worst performing receiver channel as a virtual reference to the network. We apply such schemes to a GEO satellite scenario. We demonstrate the benefits of the proposed schemes comparing them to a per-receiver point-to-point adaptive strategy.
△ Less
Submitted 16 April, 2017;
originally announced April 2017.
-
Energy Efficient Adaptive Network Coding Schemes for Satellite Communications
Authors:
Ala Eddine Gharsellaoui,
Samah A. M. Ghanem,
Daniele Tarchi,
Alessandro Vanelli Coralli
Abstract:
In this paper, we propose novel energy efficient adaptive network coding and modulation schemes for time variant channels. We evaluate such schemes under a realistic channel model for open area environments and Geostationary Earth Orbit (GEO) satellites. Compared to non-adaptive network coding and adaptive rate efficient network-coded schemes for time variant channels, we show that our proposed sc…
▽ More
In this paper, we propose novel energy efficient adaptive network coding and modulation schemes for time variant channels. We evaluate such schemes under a realistic channel model for open area environments and Geostationary Earth Orbit (GEO) satellites. Compared to non-adaptive network coding and adaptive rate efficient network-coded schemes for time variant channels, we show that our proposed schemes, through physical layer awareness can be designed to transmit only if a target quality of service (QoS) is achieved. As a result, such schemes can provide remarkable energy savings.
△ Less
Submitted 16 April, 2017;
originally announced April 2017.
-
Adaptive Network Coding Schemes for Satellite Communications
Authors:
Ala Eddine Gharsellaoui,
Samah A. M. Ghanem,
Daniele Tarchi,
Alessandro Vanelli-Coralli
Abstract:
In this paper, we propose two novel physical layer aware adaptive network coding and coded modulation schemes for time variant channels. The proposed schemes have been applied to different satellite communications scenarios with different Round Trip Times (RTT). Compared to adaptive network coding, and classical non-adaptive network coding schemes for time variant channels, as benchmarks, the prop…
▽ More
In this paper, we propose two novel physical layer aware adaptive network coding and coded modulation schemes for time variant channels. The proposed schemes have been applied to different satellite communications scenarios with different Round Trip Times (RTT). Compared to adaptive network coding, and classical non-adaptive network coding schemes for time variant channels, as benchmarks, the proposed schemes demonstrate that adaptation of packet transmission based on the channel variation and corresponding erasures allows for significant gains in terms of throughput, delay and energy efficiency. We shed light on the trade-off between energy efficiency and delay-throughput gains, demonstrating that conservative adaptive approaches that favors less transmission under high erasures, might cause higher delay and less throughput gains in comparison to non-conservative approaches that favor more transmission to account for high erasures.
△ Less
Submitted 15 April, 2017;
originally announced April 2017.
-
Generalized I-MMSE for K-User Gaussian Channels
Authors:
Samah A. M. Ghanem
Abstract:
In this paper, we generalize the fundamental relation between the mutual information and the minimum mean squared error (MMSE) by Guo, Shamai, and Verdu [1] to K-User Gaussian channels. We prove that the derivative of the multiuser mutual information with respect to the signal to noise ratio (SNR) is equal to the total MMSE plus a covariance term with respect to the cross correlation of the multiu…
▽ More
In this paper, we generalize the fundamental relation between the mutual information and the minimum mean squared error (MMSE) by Guo, Shamai, and Verdu [1] to K-User Gaussian channels. We prove that the derivative of the multiuser mutual information with respect to the signal to noise ratio (SNR) is equal to the total MMSE plus a covariance term with respect to the cross correlation of the multiuser input estimates, the channels and the precoding matrices. We shed light that such relation is a generalized I-MMSE with one step lookahead and lookback, applied to the Successive Interference Cancellation (SIC) in the decoding process.
△ Less
Submitted 19 April, 2017; v1 submitted 28 October, 2016;
originally announced October 2016.
-
Exploring Trust-Aware Neighbourhood in Trust-based Recommendation
Authors:
Amira Ghenai,
Moustafa M. Ghanem
Abstract:
Traditional Recommender Systems (RS) do not consider any personal user information beyond rating history. Such information, on the other hand, is widely available on social networking sites (Facebook, Twitter). As a result, social networks have recently been used in recommendation systems. In this paper, we propose an efficient method for incorporating social signals into the recommendation proces…
▽ More
Traditional Recommender Systems (RS) do not consider any personal user information beyond rating history. Such information, on the other hand, is widely available on social networking sites (Facebook, Twitter). As a result, social networks have recently been used in recommendation systems. In this paper, we propose an efficient method for incorporating social signals into the recommendation process by building a trust network which supplements the users' rating profiles. We first show the effect of different cold-start users types on the Collaborative Filtering (CF) technique in several real-world datasets. Later, we propose a "Trust-Aware Neighbourhood" algorithm which addresses a performance issue of the former by limiting the trusted neighbourhood. We show the doubling of the rating coverage compared to the traditional CF technique, and a significant improvement in the accuracy for some datasets. Focusing specifically on cold-start users, we propose a "Hybrid Trust-Aware Neighbourhood" algorithm which expands the neighbourhood by considering both trust and rating history of the users. We show a near complete coverage with a rich trust network dataset-- Flixster. We conclude by discussing the potential implementation of this algorithm in a budget-constrained cloud environment.
△ Less
Submitted 18 August, 2016;
originally announced August 2016.
-
Network Coding: Connections Between Information Theory And Estimation Theory
Authors:
Samah A. M. Ghanem
Abstract:
In this paper, we prove the existence of fundamental relations between information theory and estimation theory for network-coded flows. When the network is represented by a directed graph G=(V, E) and under the assumption of uncorrelated noise over information flows between the directed links connecting transmitters, switches (relays), and receivers. We unveil that there yet exist closed-form rel…
▽ More
In this paper, we prove the existence of fundamental relations between information theory and estimation theory for network-coded flows. When the network is represented by a directed graph G=(V, E) and under the assumption of uncorrelated noise over information flows between the directed links connecting transmitters, switches (relays), and receivers. We unveil that there yet exist closed-form relations for the gradient of the mutual information with respect to different components of the system matrix M. On the one hand, this result opens a new class of problems casting further insights into effects of the network topology, topological changes when nodes are mobile, and the impact of errors and delays in certain links into the network capacity which can be further studied in scenarios where one source multi-sinks multicasts and multi-source multicast where the invertibility and the rank of matrix M plays a significant role in the decoding process and therefore, on the network capacity. On the other hand, it opens further research questions of finding precoding solutions adapted to the network level.
△ Less
Submitted 26 January, 2016; v1 submitted 3 November, 2015;
originally announced December 2015.
-
Multiuser I-MMSE
Authors:
Samah A. M. Ghanem
Abstract:
In this paper, we generalize the fundamental relation between the derivative of the mutual information and the minimum mean squared error (MMSE) to multiuser setups. We prove that the derivative of the mutual information with respect to the signal to noise ratio (SNR) is equal to the MMSE plus a covariance induced due to the interference, quantified by a term with respect to the cross correlation…
▽ More
In this paper, we generalize the fundamental relation between the derivative of the mutual information and the minimum mean squared error (MMSE) to multiuser setups. We prove that the derivative of the mutual information with respect to the signal to noise ratio (SNR) is equal to the MMSE plus a covariance induced due to the interference, quantified by a term with respect to the cross correlation of the multiuser input estimates, the channels and the precoding matrices. We also derive new relations for the gradient of the conditional and non-conditional mutual information with respect to the MMSE. Capitalizing on the new fundamental relations, we derive closed form expressions of the mutual information for the multiuser channels, particularly the two user multiple access Gaussian channel driven by binary phase shift keying (BPSK) to illustrate and shed light on methods to derive similar expressions for higher level constellations. We capitalize on the new unveiled relation to derive the multiuser MMSE and mutual information in the low-SNR regime.
△ Less
Submitted 23 March, 2017; v1 submitted 26 April, 2015;
originally announced April 2015.
-
Multi-Cell Processing with Limited Cooperation: A Novel Framework to Timely Designs and Reduced CSI Feedback with General Inputs
Authors:
Samah A. M. Ghanem
Abstract:
We investigate the optimal power allocation and optimal precoding for a multi-cell-processing (MCP) framework with limited cooperation. In particular, we consider two base stations(BSs) which maximize the achievable rate for two users connecting to each BS and sharing channel state information (CSI). We propose a two way channel estimation or prediction process. Such framework has promising outcom…
▽ More
We investigate the optimal power allocation and optimal precoding for a multi-cell-processing (MCP) framework with limited cooperation. In particular, we consider two base stations(BSs) which maximize the achievable rate for two users connecting to each BS and sharing channel state information (CSI). We propose a two way channel estimation or prediction process. Such framework has promising outcomes in terms of feedback reduction and acheivable rates moving the system from one with unkown CSI at the transmitter to a system with instantanous CSI at both sides of the communication. We derive new extentions of the fundamental relation between the gradient of the mutual information and the MMSE for the conditional and non-conditional mutual information. Capitalizing on such relations, we provide the optimal power allocation and optimal precoding designs with respect to the estimated channel and MMSE. The designs introduced are optimal for multiple access (MAC) Gaussian coherent time-varying fading channels with general inputs and can be specialized to multiple input multiple output (MIMO) channels by decoding interference. The impact of interference on the capacity is quantified by the gradient of the mutual information with respect to the power, channel, and error covariance of the interferer. We provide two novel distributed MCP algorithms that provide the solutions for the optimal power allocation and optimal precoding for the UL and DL with a two way channel estimation to keep track of the channel variations over blocks of data transmission. Therefore, we provide a novel solution that allows with limited cooperation: a significant reduction in the CSI feedback from the receiver to the transmitter, and timely optimal designs of the precoding and power allocation.
△ Less
Submitted 11 January, 2016; v1 submitted 3 November, 2014;
originally announced November 2014.
-
Multiple Access Gaussian Channels with Arbitrary Inputs: Optimal Precoding and Power Allocation
Authors:
Samah A. M. Ghanem
Abstract:
In this paper, we derive new closed-form expressions for the gradient of the mutual information with respect to arbitrary parameters of the two-user multiple access channel (MAC). The derived relations generalize the fundamental relation between the derivative of the mutual information and the minimum mean squared error (MMSE) to multiuser setups. We prove that the derivative of the mutual informa…
▽ More
In this paper, we derive new closed-form expressions for the gradient of the mutual information with respect to arbitrary parameters of the two-user multiple access channel (MAC). The derived relations generalize the fundamental relation between the derivative of the mutual information and the minimum mean squared error (MMSE) to multiuser setups. We prove that the derivative of the mutual information with respect to the signal to noise ratio (SNR) is equal to the MMSE plus a covariance induced due to the interference, quantified by a term with respect to the cross correlation of the multiuser input estimates, the channels and the precoding matrices. We also derive new relations for the gradient of the conditional and non-conditional mutual information with respect to the MMSE. Capitalizing on the new fundamental relations, we investigate the linear precoding and power allocation policies that maximize the mutual information for the two-user MAC Gaussian channels with arbitrary input distributions. We show that the optimal design of linear precoders may satisfy a fixed-point equation as a function of the channel and the input constellation under specific setups. We show also that the non-mutual interference in a multiuser setup introduces a term to the gradient of the mutual information which plays a fundamental role in the design of optimal transmission strategies, particularly the optimal precoding and power allocation, and explains the losses in the data rates. Therefore, we provide a novel interpretation of the interference with respect to the channel, power, and input estimates of the main user and the interferer.
△ Less
Submitted 6 November, 2014; v1 submitted 3 November, 2014;
originally announced November 2014.
-
Secure Data Transmission in Cooperative Modes: Relay and MAC
Authors:
Samah A. M. Ghanem,
Munnujahan Ara
Abstract:
Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size…
▽ More
Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size wireless clouds. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We provide the achievable secure data transmission rates with cooperative relaying and when no cooperation exists creating a Multiple Access Channel (MAC). The paper considers the analysis of different cooperative scenarios: a cooperative scenario with two relaying devices, a cooperative scenario without relaying, a non-cooperative scenario, and cooperation from one side. We derive analytical expressions for the optimal power allocation that maximizes the achievable secrecy rates for the different set of scenarios where the implication of cooperation on the achievable secrecy rates was analyzed. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to choose their optimal power allocation based on the cooperation framework selected. Moreover, we defined distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
△ Less
Submitted 14 May, 2014;
originally announced May 2014.
-
VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering
Authors:
Karim M. Mohamed,
Mohamed A. Ismail,
Nagia M. Ghanem
Abstract:
In this paper, we present VSCAN, a novel approach for generating static video summaries. This approach is based on a modified DBSCAN clustering algorithm to summarize the video content utilizing both color and texture features of the video frames. The paper also introduces an enhanced evaluation method that depends on color and texture features. Video Summaries generated by VSCAN are compared with…
▽ More
In this paper, we present VSCAN, a novel approach for generating static video summaries. This approach is based on a modified DBSCAN clustering algorithm to summarize the video content utilizing both color and texture features of the video frames. The paper also introduces an enhanced evaluation method that depends on color and texture features. Video Summaries generated by VSCAN are compared with summaries generated by other approaches found in the literature and those created by users. Experimental results indicate that the video summaries generated by VSCAN have a higher quality than those generated by other approaches.
△ Less
Submitted 1 May, 2014;
originally announced May 2014.