-
A Survey on Data-Driven Fault Diagnostic Techniques for Marine Diesel Engines
Authors:
Ayah Youssef,
Hassan Noura,
Abderrahim El Amrani,
El Mostafa El Adel,
Mustapha Ouladsine
Abstract:
Fault diagnosis in marine diesel engines is vital for maritime safety and operational efficiency.These engines are integral to marine vessels, and their reliable performance is crucial for safenavigation. Swift identification and resolution of faults are essential to prevent breakdowns,enhance safety, and reduce the risk of catastrophic failures at sea. Proactive fault diagnosisfacilitates timely…
▽ More
Fault diagnosis in marine diesel engines is vital for maritime safety and operational efficiency.These engines are integral to marine vessels, and their reliable performance is crucial for safenavigation. Swift identification and resolution of faults are essential to prevent breakdowns,enhance safety, and reduce the risk of catastrophic failures at sea. Proactive fault diagnosisfacilitates timely maintenance, minimizes downtime, and ensures the overall reliability andlongevity of marine diesel engines. This paper explores the importance of fault diagnosis,emphasizing subsystems, common faults, and recent advancements in data-driven approachesfor effective marine diesel engine maintenance
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
A Deep Learning Scheme for Efficient Multimedia IoT Data Compression
Authors:
Hassan N. Noura,
Ola Salman,
Raphaël Couturier
Abstract:
Given the voluminous nature of the multimedia sensed data, the Multimedia Internet of Things (MIoT) devices and networks will present several limitations in terms of power and communication overhead. One traditional solution to cope with the large-size data challenge is to use lossy compression. However, current lossy compression schemes require low compression rate to guarantee acceptable perceiv…
▽ More
Given the voluminous nature of the multimedia sensed data, the Multimedia Internet of Things (MIoT) devices and networks will present several limitations in terms of power and communication overhead. One traditional solution to cope with the large-size data challenge is to use lossy compression. However, current lossy compression schemes require low compression rate to guarantee acceptable perceived image quality, which results in a low reduction of the communicated data size and consequently a low reduction in the energy and bandwidth consumption. Thus, an efficient compression solution is required for striking a good balance between data size (and consequently communication overhead) and visual degradation. In this paper, a Deep-Learning (DL) super-resolution model is applied to recuperate high quality images (at the application server side) given as input degraded images with a high compression ratio (at the sender side). The experimental analysis shows the effectiveness of the proposed solution in enhancing the visual quality of the compressed and down-scaled images. Consequently, the proposed solution reduces the overall communication overhead and power consumption of limited MIoT devices.
△ Less
Submitted 3 April, 2021;
originally announced May 2021.
-
A Deep Learning Object Detection Method for an Efficient Clusters Initialization
Authors:
Raphaël Couturier,
Hassan N. Noura,
Ola Salman,
Abderrahmane Sider
Abstract:
Clustering is an unsupervised machine learning method grou** data samples into clusters of similar objects. In practice, clustering has been used in numerous applications such as banking customers profiling, document retrieval, image segmentation, and e-commerce recommendation engines. However, the existing clustering techniques present significant limitations, from which is the dependability of…
▽ More
Clustering is an unsupervised machine learning method grou** data samples into clusters of similar objects. In practice, clustering has been used in numerous applications such as banking customers profiling, document retrieval, image segmentation, and e-commerce recommendation engines. However, the existing clustering techniques present significant limitations, from which is the dependability of their stability on the initialization parameters (e.g. number of clusters, centroids). Different solutions were presented in the literature to overcome this limitation (i.e. internal and external validation metrics). However, these solutions require high computational complexity and memory consumption, especially when dealing with big data. In this paper, we apply the recent object detection Deep Learning (DL) model, named YOLO-v5, to detect the initial clustering parameters such as the number of clusters with their sizes and centroids. Mainly, the proposed solution consists of adding a DL-based initialization phase making the clustering algorithms free of initialization. Two model solutions are provided in this work, one for isolated clusters and the other one for overlap** clusters. The features of the incoming dataset determine which model to use. Moreover, The results show that the proposed solution can provide near-optimal clusters initialization parameters with low computational and resources overhead compared to existing solutions.
△ Less
Submitted 4 July, 2021; v1 submitted 28 April, 2021;
originally announced April 2021.
-
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations
Authors:
Jean-Paul A. Yaacoub,
Hassan N. Noura,
Ola Salman,
Ali Chehab
Abstract:
The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming m…
▽ More
The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming more efficient and more sophisticated. Therefore, traditional cryptographic and non-cryptographic solutions and access control systems are no longer enough to prevent such cyber attacks, especially in terms of acquiring evidence for attack investigation. Hence, the need for well-defined, sophisticated, and advanced forensics investigation tools are highly required to track down cyber criminals and to reduce the number of cyber crimes. This paper reviews the different forensics and anti-forensics methods, tools, techniques, types, and challenges, while also discussing the rise of the anti-anti-forensics as a new forensics protection mechanism against anti-forensics activities. This would help forensics investigators to better understand the different anti-forensics tools, methods and techniques that cyber criminals employ while launching their attacks. Moreover, the limitations of the current forensics techniques are discussed, especially in terms of issues and challenges. Finally, this paper presents a holistic view from a literature point of view over the forensics domain and also helps other fellow colleagues in their quest to further understand the digital forensics domain.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
A Survey on Ethical Hacking: Issues and Challenges
Authors:
Jean-Paul A. Yaacoub,
Hassan N. Noura,
Ola Salman,
Ali Chehab
Abstract:
Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of…
▽ More
Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of penetration tests. The objective of penetration tests is to make existing systems and their corresponding data more secure, efficient and resilient. In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap. In fact, any identified exploitable vulnerability will be used to conduct attacks on systems, devices, or personnel. This growing problem should be solved and mitigated to reach better resistance against these attacks. Moreover, the advantages and limitations of penetration tests are also listed. The main issue of penetration tests that it is efficient to detect known vulnerabilities. Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots. This can also be done by reinforcing the anomaly detection of intrusion detection/prevention system. In fact, security is increased by designing an efficient cooperation between the different security elements and penetration tests.
△ Less
Submitted 28 March, 2021;
originally announced March 2021.
-
An Efficient Keyless Fragmentation Algorithm for Data Protection
Authors:
Katarzyna Kapusta,
Gerard Memmi,
Hassan Noura
Abstract:
The family of Information Dispersal Algorithms is applied to distributed systems for secure and reliable storage and transmission. In comparison with perfect secret sharing it achieves a significantly smaller memory overhead and better performance, but provides only incremental confidentiality. Therefore, even if it is not possible to explicitly reconstruct data from less than the required amount…
▽ More
The family of Information Dispersal Algorithms is applied to distributed systems for secure and reliable storage and transmission. In comparison with perfect secret sharing it achieves a significantly smaller memory overhead and better performance, but provides only incremental confidentiality. Therefore, even if it is not possible to explicitly reconstruct data from less than the required amount of fragments, it is still possible to deduce some information about the nature of data by looking at preserved data patterns inside a fragment. The idea behind this paper is to provide a lightweight data fragmentation scheme, that would combine the space efficiency and simplicity that could be find in Information Dispersal Algorithms with a computational level of data confidentiality.
△ Less
Submitted 27 May, 2017;
originally announced May 2017.
-
A Revision of a New Chaos-Based Image Encryption System: Weaknesses and Limitations
Authors:
Hassan Noura,
Lama Sleem,
Raphaël Couturier
Abstract:
Lately, multimedia encryption has been the focus of attention in many researches. Recently, a large number of encryption algorithms has been presented to protect image contents.The main objective of modern image encryption schemes is to reduce the computation complexity in order to respond to the real time multimedia and/or limited resources requirements without degrading the high level of securit…
▽ More
Lately, multimedia encryption has been the focus of attention in many researches. Recently, a large number of encryption algorithms has been presented to protect image contents.The main objective of modern image encryption schemes is to reduce the computation complexity in order to respond to the real time multimedia and/or limited resources requirements without degrading the high level of security. In fact, most of the recent solutions are based on the chaotic theory. However, the majority of chaotic systems suffers from different limitations and their implementation is difficult at the hardware level because of the non integer operations that are employed requiring huge resources and latency. In this paper, we analyze the new chaos-based image encryption system presented in~\cite{el2016new}. It uses a static binary diffusion layer, followed by a key dependent bit-permutation layer that only iterates for one round. Based on their results in this paper, we claim that the uniformity and avalanche effect can be reached from the first round. However, we tried to verify the results but our conclusion was that these results were wrong because it was shown that at least 6 iterations are necessary to ensure the required cryptographic performance such as the plain-sensitivity property. Therefore, the required execution time must be multiplied by 6 and consequently this will increase the latency. In addition to all aforementioned problems, we find that ensuring the avalanche effect in the whole image introduces a high error propagation. In order to solve this problem, we recommend to ensure the avalanche effect in the level of blocks instead of the whole image.
△ Less
Submitted 29 January, 2017;
originally announced January 2017.