ahmed abdelaziz - Academia.edu (original) (raw)
Papers by ahmed abdelaziz
Applied Sciences, 2019
A comprehensive study of outdoor visible light communication (VLC) under snow and rain effects ha... more A comprehensive study of outdoor visible light communication (VLC) under snow and rain effects has been conducted in this paper. This paper analyzes the expected rain attenuation of Marshal, Carbonneau, and Japan models at different precipitation levels. Snow attenuation is measured in wet and dry situations at various precipitation levels as well. Therefore, a full comparison is carried out for different attenuation effects on certain outdoor VLC design characteristics such as the maximum signal-to-noise ratio (SNR), optical power received, bit error rate (BER), and maximum coverage area. VLC with various modulation techniques is considered. The ON–OFF Keying (OOK), L-Pulse Position Modulation (L-PPM), Inverse L-Pulse Position Modulation (I-L-PPM), and Subcarrier Binary Phase-Shift Keying (SC-BPSK) are investigated. The simulation results show a considerable difference in the information received under different weather conditions depending on the type of modulation scheme used. Th...
Applied Sciences, 2019
This paper aims to extend the limited bandwidth of phosphorescent white LEDs for a multiple-input... more This paper aims to extend the limited bandwidth of phosphorescent white LEDs for a multiple-input single-output (MISO) visible light communication (VLC) system. A proposed LED arrangement model is presented, resulting in improved results as compared to those previously discussed in the literature. In this paper, the impact of the receiver field of view (FOV) angle, the LED transmission angle, and the number of LED arrays used on the transmission are studied at different speeds. The system performance is measured by the signal to noise ratio (SNR) and the corresponding bit error rate (BER) at different data rates. The obtained results show that the proposed model is able to improve the illumination uniformity across the room with a higher SNR using the same number of LEDs in the investigated indoor environment. The paper also introduces a pre-equalization circuit in the transmitter end in order to extend the limited bandwidth of the used white LEDs. This bandwidth extension using the...
2013 High Capacity Optical Networks and Emerging/Enabling Technologies, 2013
IFIP Advances in Information and Communication Technology, 2014
This project explores a novel experimental setup towards building spoken, multi-modally rich, and... more This project explores a novel experimental setup towards building spoken, multi-modally rich, and human-like multiparty tutoring agent. A setup is developed and a corpus is collected that targets the development of a dialogue system platform to explore verbal and nonverbal tutoring strategies in multiparty spoken interactions with embodied agents. The dialogue task is centered on two participants involved in a dialogue aiming to solve a card-ordering game. With the participants sits a tutor that helps the participants perform the task and organizes and balances their interaction. Different multimodal signals captured and auto-synchronized by different audiovisual capture technologies were coupled with manual annotations to build a situated model of the interaction based on the participants personalities, their temporally-changing state of attention, their conversational engagement and verbal dominance, and the way these are correlated with the verbal and visual feedback, turn-management, and conversation regulatory actions generated by the tutor. At the end of this chapter we discuss the potential areas of research and developments this work opens and some of the challenges that lie in the road ahead.
2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, 2013
In this paper, we experimentally transmit the required information to the automatic teller machin... more In this paper, we experimentally transmit the required information to the automatic teller machine (ATM) or card readers over a visible light communication channel employing mobile smartphones LED flashlight at high data rates. Due to the dependence of users on their personal digital assistants and smartphones to perform almost everyday tasks including payments and banking transactions, it is of great interest to use such phones to replace the magnetic cards. This paper encodes the LED camera flashlight embedded in almost every smartphone with the required information with no additional hardware on the receiver end. However, a small sized non-expensive module is added to ATMs and card readers to detect and decode the received data. The proposed unidirectional optical link offers secure transmission with a speed up to 500 bps with no error detected.
2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14), 2014
PLOS ONE, 2017
Software Defined Networking (SDN) is an emerging promising paradigm for network management becaus... more Software Defined Networking (SDN) is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs) brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN) SDN and Open Network Operating System (ONOS) controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.
Landmines are dangerous problem that threats people lives and causes economic problems. Landmines... more Landmines are dangerous problem that threats people lives and causes economic problems. Landmines are harmful because of their unknown locations and difficulty to detect them. There are more than active 100 million landmines in the world. Detecting and clearing mines demands specific expertise. There are many techniques were used to detect landmines and clear them. The robotic method was an effective technique that solved the risks on human operators. This thesis studies strategies for humanitarian demining using robotic units. We present a low-cost system for landmines detection. The proposed system uses fusion of low cost multi sensors instead of using very expensive one. The proposed robot used sensor fusion technique to increase the probability of mine detection. We have developed decision level fusion to decrease false alarm of mines detection. We used complete coverage path planning to find all possible mines in the environment.We proposed using multiple robots with the same s...
2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020
The complex nature of SDN coupled with the huge number of services they provide; makes the system... more The complex nature of SDN coupled with the huge number of services they provide; makes the system as a whole prone to some malicious attacks. An attack such as Link Fabrication Attack (LFA) is becoming more and more common with a high degree of sophistication. Different techniques exist which examine the occurrence of LFA in SDN. To ensure that SDN does not suffer from the same attack from the same origin, we have to consider in general the entire system liability, service information, dependencies, and switch as well as host vulnerabilities. However, due to the complex nature and scalability property of SDN, determining the origin of the LFA is not a straight forward. Although other solutions have been proposed to address this problem in traditional networks, a formal method to security in SDN is lacking. In this paper, we discuss a formal method for SDN using Higher-Order Logic (HOL) and as a case study used to examine the LFA in SDN.
Security in Smart Cities: Models, Applications, and Challenges, 2018
Cloud computing and internet of things (IOT) plays an important role in health care services espe... more Cloud computing and internet of things (IOT) plays an important role in health care services especially in the prediction of diseases in smart cities. IOT devices (digital sensors and etc.) can be used to send big data onto chronic kidney diseases (CKD) to store it in the cloud computing. Therefore, these big data are used to increase the accuracy of prediction of CKD on cloud environment. The prediction of dangerous diseases such as CKD based cloud-IOT is considered a big problem that facing the stakeholders of health cares in smart cities. This paper focuses on predicting of CKD as an example of health care services on cloud computing environment. Cloud computing is supported patients to predict of CKD anywhere and anytime in smart cities. For that, this paper proposes a hybrid intelligent model for predicting CKD based cloud-IOT by using two intelligent techniques, which are linear regression (LR) and neural network (NN). LR is used to determine critical factors that influence on CKD. NN is used to predict of CKD. The results show that, the accuracy of hybrid intelligent model in predicting of CKD is 97.8%. In addition, a hybrid intelligent model is applied on windows azure as an example of a cloud computing environment to predict of CKD to support patients in smart cities. The proposed model is superior to most of the models referred to in the related works by 64%.
Assiut Journal of Sport Science and Arts, 2017
IEEE Access, 2016
In recent years, the migration of the computational workload to computational clouds has attracte... more In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks. INDEX TERMS Cloud investigation, network forensics, SWOT analysis, cloud networks.
This paper describes a novel experimental setup exploiting state-of-the-art capture equipment to ... more This paper describes a novel experimental setup exploiting state-of-the-art capture equipment to collect a multimodally rich game-solving collaborative multiparty dialogue corpus. The corpus is targeted and designed towards the development of a dialogue system platform to explore verbal and nonverbal tutoring strategies in multiparty spoken interactions. The dialogue task is centered on two participants involved in a dialogue aiming to solve a card-ordering game. The participants were paired into teams based on their degree of extraversion as resulted from a personality test. With the participants sits a tutor that helps them perform the task, organizes and balances their interaction and whose behavior was assessed by the participants after each interaction. Different multimodal signals captured and auto-synchronized by different audio-visual capture technologies, together with manual annotations of the tutor’s behavior constitute the Tutorbot corpus. This corpus is exploited to bui...
Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering
Page 1. EFFECT OF PROTECTION SYSTEM FAILURE ON POWER NETWORK RELIABILITY EVALUATION Ahmed A. Lot@... more Page 1. EFFECT OF PROTECTION SYSTEM FAILURE ON POWER NETWORK RELIABILITY EVALUATION Ahmed A. Lot@ Ahmed R. Abdelaziz Ahmed A. Hossam-Eldin Electrical & control Eng. Dept., AAST Alexandria, Egypt. Electrical Eng. ...
Pédagogie médicale, 2002
In t ro d u c t i o n La formation médicale continue (FMC) est une étape dans le cursus d'une for... more In t ro d u c t i o n La formation médicale continue (FMC) est une étape dans le cursus d'une formation qui devrait se pro l o nger théoriquement à vie 1. Son importance pour toutes les spécialités médicales fait actuellement consensus 2 et son inscription dans la législation de plusieurs p a y s 3 au cours des dernières années, témoigne de sa Re c h e rche et Pe r s p e c t i ve s
Electric Machines & Power Systems, 1993
In this paper, the idea of the network decomposition is discussed. The decomposition technique to... more In this paper, the idea of the network decomposition is discussed. The decomposition technique to evaluate the reliability of complex networks is introduced. The decomposition is used to tear the network into two subnetworks. Some basic rules for combining probabilities is given and is modified to combine the reliabilities of subnetworks. Two trends are presented. The first is to generate
… (UPEC), 2010 45th …, 2010
... Distribution Systems Ahmed A. Hossam-Eldin Ahmed R. Abdelaziz Alaa-Eldin I. Abu Fard Departme... more ... Distribution Systems Ahmed A. Hossam-Eldin Ahmed R. Abdelaziz Alaa-Eldin I. Abu Fard Department of Electrical Engineering, Alexandria University, Alexandria, 21544 Egypt Abstract: This work presents a simulated annealing (SA) method ...
IEEE Access, 2020
Software-defined networking (SDN) separates the network control plane from the packet forwarding ... more Software-defined networking (SDN) separates the network control plane from the packet forwarding plane, which provides comprehensive network-state visibility for better network management and resilience. Traffic classification, particularly for elephant flow detection, can lead to improved flow control and resource provisioning in SDN networks. Existing elephant flow detection techniques use pre-set thresholds that cannot scale with the changes in the traffic concept and distribution. This paper proposes a flow-aware elephant flow detection applied to SDN. The proposed technique employs two classifiers, each respectively on SDN switches and controller, to achieve accurate elephant flow detection efficiently. Moreover, this technique allows sharing the elephant flow classification tasks between the controller and switches. Hence, most mice flows can be filtered in the switches, thus avoiding the need to send large numbers of classification requests and signaling messages to the controller. Experimental findings reveal that the proposed technique outperforms contemporary methods in terms of the running time, accuracy, F-measure, and recall. INDEX TERMS Software-defined networking, flow classification, elephant flow detection.
Applied Sciences, 2019
A comprehensive study of outdoor visible light communication (VLC) under snow and rain effects ha... more A comprehensive study of outdoor visible light communication (VLC) under snow and rain effects has been conducted in this paper. This paper analyzes the expected rain attenuation of Marshal, Carbonneau, and Japan models at different precipitation levels. Snow attenuation is measured in wet and dry situations at various precipitation levels as well. Therefore, a full comparison is carried out for different attenuation effects on certain outdoor VLC design characteristics such as the maximum signal-to-noise ratio (SNR), optical power received, bit error rate (BER), and maximum coverage area. VLC with various modulation techniques is considered. The ON–OFF Keying (OOK), L-Pulse Position Modulation (L-PPM), Inverse L-Pulse Position Modulation (I-L-PPM), and Subcarrier Binary Phase-Shift Keying (SC-BPSK) are investigated. The simulation results show a considerable difference in the information received under different weather conditions depending on the type of modulation scheme used. Th...
Applied Sciences, 2019
This paper aims to extend the limited bandwidth of phosphorescent white LEDs for a multiple-input... more This paper aims to extend the limited bandwidth of phosphorescent white LEDs for a multiple-input single-output (MISO) visible light communication (VLC) system. A proposed LED arrangement model is presented, resulting in improved results as compared to those previously discussed in the literature. In this paper, the impact of the receiver field of view (FOV) angle, the LED transmission angle, and the number of LED arrays used on the transmission are studied at different speeds. The system performance is measured by the signal to noise ratio (SNR) and the corresponding bit error rate (BER) at different data rates. The obtained results show that the proposed model is able to improve the illumination uniformity across the room with a higher SNR using the same number of LEDs in the investigated indoor environment. The paper also introduces a pre-equalization circuit in the transmitter end in order to extend the limited bandwidth of the used white LEDs. This bandwidth extension using the...
2013 High Capacity Optical Networks and Emerging/Enabling Technologies, 2013
IFIP Advances in Information and Communication Technology, 2014
This project explores a novel experimental setup towards building spoken, multi-modally rich, and... more This project explores a novel experimental setup towards building spoken, multi-modally rich, and human-like multiparty tutoring agent. A setup is developed and a corpus is collected that targets the development of a dialogue system platform to explore verbal and nonverbal tutoring strategies in multiparty spoken interactions with embodied agents. The dialogue task is centered on two participants involved in a dialogue aiming to solve a card-ordering game. With the participants sits a tutor that helps the participants perform the task and organizes and balances their interaction. Different multimodal signals captured and auto-synchronized by different audiovisual capture technologies were coupled with manual annotations to build a situated model of the interaction based on the participants personalities, their temporally-changing state of attention, their conversational engagement and verbal dominance, and the way these are correlated with the verbal and visual feedback, turn-management, and conversation regulatory actions generated by the tutor. At the end of this chapter we discuss the potential areas of research and developments this work opens and some of the challenges that lie in the road ahead.
2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, 2013
In this paper, we experimentally transmit the required information to the automatic teller machin... more In this paper, we experimentally transmit the required information to the automatic teller machine (ATM) or card readers over a visible light communication channel employing mobile smartphones LED flashlight at high data rates. Due to the dependence of users on their personal digital assistants and smartphones to perform almost everyday tasks including payments and banking transactions, it is of great interest to use such phones to replace the magnetic cards. This paper encodes the LED camera flashlight embedded in almost every smartphone with the required information with no additional hardware on the receiver end. However, a small sized non-expensive module is added to ATMs and card readers to detect and decode the received data. The proposed unidirectional optical link offers secure transmission with a speed up to 500 bps with no error detected.
2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14), 2014
PLOS ONE, 2017
Software Defined Networking (SDN) is an emerging promising paradigm for network management becaus... more Software Defined Networking (SDN) is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs) brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN) SDN and Open Network Operating System (ONOS) controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.
Landmines are dangerous problem that threats people lives and causes economic problems. Landmines... more Landmines are dangerous problem that threats people lives and causes economic problems. Landmines are harmful because of their unknown locations and difficulty to detect them. There are more than active 100 million landmines in the world. Detecting and clearing mines demands specific expertise. There are many techniques were used to detect landmines and clear them. The robotic method was an effective technique that solved the risks on human operators. This thesis studies strategies for humanitarian demining using robotic units. We present a low-cost system for landmines detection. The proposed system uses fusion of low cost multi sensors instead of using very expensive one. The proposed robot used sensor fusion technique to increase the probability of mine detection. We have developed decision level fusion to decrease false alarm of mines detection. We used complete coverage path planning to find all possible mines in the environment.We proposed using multiple robots with the same s...
2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020
The complex nature of SDN coupled with the huge number of services they provide; makes the system... more The complex nature of SDN coupled with the huge number of services they provide; makes the system as a whole prone to some malicious attacks. An attack such as Link Fabrication Attack (LFA) is becoming more and more common with a high degree of sophistication. Different techniques exist which examine the occurrence of LFA in SDN. To ensure that SDN does not suffer from the same attack from the same origin, we have to consider in general the entire system liability, service information, dependencies, and switch as well as host vulnerabilities. However, due to the complex nature and scalability property of SDN, determining the origin of the LFA is not a straight forward. Although other solutions have been proposed to address this problem in traditional networks, a formal method to security in SDN is lacking. In this paper, we discuss a formal method for SDN using Higher-Order Logic (HOL) and as a case study used to examine the LFA in SDN.
Security in Smart Cities: Models, Applications, and Challenges, 2018
Cloud computing and internet of things (IOT) plays an important role in health care services espe... more Cloud computing and internet of things (IOT) plays an important role in health care services especially in the prediction of diseases in smart cities. IOT devices (digital sensors and etc.) can be used to send big data onto chronic kidney diseases (CKD) to store it in the cloud computing. Therefore, these big data are used to increase the accuracy of prediction of CKD on cloud environment. The prediction of dangerous diseases such as CKD based cloud-IOT is considered a big problem that facing the stakeholders of health cares in smart cities. This paper focuses on predicting of CKD as an example of health care services on cloud computing environment. Cloud computing is supported patients to predict of CKD anywhere and anytime in smart cities. For that, this paper proposes a hybrid intelligent model for predicting CKD based cloud-IOT by using two intelligent techniques, which are linear regression (LR) and neural network (NN). LR is used to determine critical factors that influence on CKD. NN is used to predict of CKD. The results show that, the accuracy of hybrid intelligent model in predicting of CKD is 97.8%. In addition, a hybrid intelligent model is applied on windows azure as an example of a cloud computing environment to predict of CKD to support patients in smart cities. The proposed model is superior to most of the models referred to in the related works by 64%.
Assiut Journal of Sport Science and Arts, 2017
IEEE Access, 2016
In recent years, the migration of the computational workload to computational clouds has attracte... more In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks. INDEX TERMS Cloud investigation, network forensics, SWOT analysis, cloud networks.
This paper describes a novel experimental setup exploiting state-of-the-art capture equipment to ... more This paper describes a novel experimental setup exploiting state-of-the-art capture equipment to collect a multimodally rich game-solving collaborative multiparty dialogue corpus. The corpus is targeted and designed towards the development of a dialogue system platform to explore verbal and nonverbal tutoring strategies in multiparty spoken interactions. The dialogue task is centered on two participants involved in a dialogue aiming to solve a card-ordering game. The participants were paired into teams based on their degree of extraversion as resulted from a personality test. With the participants sits a tutor that helps them perform the task, organizes and balances their interaction and whose behavior was assessed by the participants after each interaction. Different multimodal signals captured and auto-synchronized by different audio-visual capture technologies, together with manual annotations of the tutor’s behavior constitute the Tutorbot corpus. This corpus is exploited to bui...
Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering
Page 1. EFFECT OF PROTECTION SYSTEM FAILURE ON POWER NETWORK RELIABILITY EVALUATION Ahmed A. Lot@... more Page 1. EFFECT OF PROTECTION SYSTEM FAILURE ON POWER NETWORK RELIABILITY EVALUATION Ahmed A. Lot@ Ahmed R. Abdelaziz Ahmed A. Hossam-Eldin Electrical & control Eng. Dept., AAST Alexandria, Egypt. Electrical Eng. ...
Pédagogie médicale, 2002
In t ro d u c t i o n La formation médicale continue (FMC) est une étape dans le cursus d'une for... more In t ro d u c t i o n La formation médicale continue (FMC) est une étape dans le cursus d'une formation qui devrait se pro l o nger théoriquement à vie 1. Son importance pour toutes les spécialités médicales fait actuellement consensus 2 et son inscription dans la législation de plusieurs p a y s 3 au cours des dernières années, témoigne de sa Re c h e rche et Pe r s p e c t i ve s
Electric Machines & Power Systems, 1993
In this paper, the idea of the network decomposition is discussed. The decomposition technique to... more In this paper, the idea of the network decomposition is discussed. The decomposition technique to evaluate the reliability of complex networks is introduced. The decomposition is used to tear the network into two subnetworks. Some basic rules for combining probabilities is given and is modified to combine the reliabilities of subnetworks. Two trends are presented. The first is to generate
… (UPEC), 2010 45th …, 2010
... Distribution Systems Ahmed A. Hossam-Eldin Ahmed R. Abdelaziz Alaa-Eldin I. Abu Fard Departme... more ... Distribution Systems Ahmed A. Hossam-Eldin Ahmed R. Abdelaziz Alaa-Eldin I. Abu Fard Department of Electrical Engineering, Alexandria University, Alexandria, 21544 Egypt Abstract: This work presents a simulated annealing (SA) method ...
IEEE Access, 2020
Software-defined networking (SDN) separates the network control plane from the packet forwarding ... more Software-defined networking (SDN) separates the network control plane from the packet forwarding plane, which provides comprehensive network-state visibility for better network management and resilience. Traffic classification, particularly for elephant flow detection, can lead to improved flow control and resource provisioning in SDN networks. Existing elephant flow detection techniques use pre-set thresholds that cannot scale with the changes in the traffic concept and distribution. This paper proposes a flow-aware elephant flow detection applied to SDN. The proposed technique employs two classifiers, each respectively on SDN switches and controller, to achieve accurate elephant flow detection efficiently. Moreover, this technique allows sharing the elephant flow classification tasks between the controller and switches. Hence, most mice flows can be filtered in the switches, thus avoiding the need to send large numbers of classification requests and signaling messages to the controller. Experimental findings reveal that the proposed technique outperforms contemporary methods in terms of the running time, accuracy, F-measure, and recall. INDEX TERMS Software-defined networking, flow classification, elephant flow detection.