atef Ibrahim - Academia.edu (original) (raw)
Papers by atef Ibrahim
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL
The amplified connectivity of routine IoT entities can expose various security trajectories for c... more The amplified connectivity of routine IoT entities can expose various security trajectories for cybercriminals to execute malevolent attacks. These dangers are even amplified by the source limitations and heterogeneity of low-budget IoT/IIoT nodes, which create existing multitude-centered and fixed perimeter-oriented security tools inappropriate for vibrant IoT settings. The offered emulation assessment exemplifies the remunerations of implementing context aware co-design oriented cognitive security method in assimilated IIoT settings and delivers exciting understandings in the strategy execution to drive forthcoming study. The innovative features of our system is in its capability to get by with irregular system connectivity as well as node limitations in terms of scares computational ability, limited buffer (at edge node), and finite energy. Based on real-time analytical data, projected scheme select the paramount probable end-to-end security system possibility that ties with an a...
Mathematics
The Internet of Things (IoT) is an interconnected network of computing nodes that can send and re... more The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks...
Alexandria Engineering Journal
Adoption of IoT technology without considering its security implications may expose network syste... more Adoption of IoT technology without considering its security implications may expose network systems to a variety of security breaches. In network systems, IoT edge devices are a major source of security risks. Implementing cryptographic algorithms on most IoT edge devices can be difficult due to their limited resources. As a result, compact implementations of these algorithms on these devices are required. Because the field multiplication operation is at the heart of most cryptographic algorithms, its implementation will have a significant impact on the entire cryptographic algorithm implementation. As a result, in this paper, we propose a small hardware accelerator for performing field multiplication on edge devices. The hardware accelerator is primarily composed of a processor array with a regular structure and local interconnection among its processing elements. The main advantage of the proposed hardware structure is the ability to manage its area, delay, and consumed energy by choosing the appropriate word size l. We implemented the proposed structure using ASIC technology and the obtained results attain average savings in the area of 95.9%. Also, we obtained significant average savings in energy of 63.2%. The acquired results reveal that the offered hardware accelerator is appropriate for usage in resource-constrained IoT edge devices.
Micromachines
In this study, we present an IoT-based robot for wrist rehabilitation with a new protocol for det... more In this study, we present an IoT-based robot for wrist rehabilitation with a new protocol for determining the state of injured muscles as well as providing dynamic model parameters. In this model, the torque produced by the robot and the torque provided by the patient are determined and updated taking into consideration the constraints of fatigue. Indeed, in the proposed control architecture based on the EMG signal extraction, a fuzzy classifier was designed and implemented to estimate muscle fatigue. Based on this estimation, the patient’s torque is updated during the rehabilitation session. The first step of this protocol consists of calculating the subject-related parameters. This concerns axis offset, inertial parameters, passive stiffness, and passive damping. The second step is to determine the remaining component of the wrist model, including the interaction torque. The subject must perform the desired movements providing the torque necessary to move the robot in the desired ...
Mathematics, 2022
Security and privacy issues with IoT edge devices hinder the application of IoT technology in man... more Security and privacy issues with IoT edge devices hinder the application of IoT technology in many applications. Applying cryptographic protocols to edge devices is the perfect solution to security issues. Implementing these protocols on edge devices represents a significant challenge due to their limited resources. Finite-field multiplication is the core operation for most cryptographic protocols, and its efficient implementation has a remarkable impact on their performance. This article offers an efficient low-area and low-power one-dimensional bit-parallel systolic implementation for field multiplication in GF(2n) based on an irreducible all-one polynomial (AOP). We represented the adopted multiplication algorithm in the bit-level form to be able to extract its dependency graph (DG). We choose to apply specific scheduling and projection vectors to the DG to extract the bit-parallel systolic multiplier structure. In contrast with most of the previously published parallel structure...
Electronics, 2020
In recent times, vehicular ad hoc networks (VANET) have become a core part of intelligent transpo... more In recent times, vehicular ad hoc networks (VANET) have become a core part of intelligent transportation systems (ITSs), which aim to achieve continual Internet connectivity among vehicles on the road. The VANET has been used to improve driving safety and construct an ITS in modern cities. However, owing to the wireless characteristics, the message transmitted through the network can be observed, altered, or forged. Since driving safety is a major part of VANET, the security and privacy of these messages must be preserved. Therefore, this paper introduces an efficient privacy-preserving data transmission architecture that makes use of blockchain technology in cluster-based VANET. The cluster-based VANET architecture is used to achieve load balancing and minimize overhead in the network, where the clustering process is performed using the rainfall optimization algorithm (ROA). The ROA-based clustering with blockchain-based data transmission, called a ROAC-B technique, initially clust...
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2020
Robots are highly incorporated in rehabilitation in the last decade to compensate lost functions ... more Robots are highly incorporated in rehabilitation in the last decade to compensate lost functions in disabled individuals. By controlling the rehabilitation robots from far, many benefits are achieved. These benefits include but not restricted to minimum hospital stays, decreasing cost, and increasing the level of care. The main goal of this work is to have an effective solution to take care of patients from far. Tackling the problem of the remote control of rehabilitation robots is undergoing and highly challenging. In this paper, a remote wrist rehabilitation system is presented. The developed system is a sophisticated robot ensuring the two wrist movements (Flexion /extension and abduction/adduction). Additionally, the proposed system provides a software interface enabling the physiotherapists to control the rehabilitation process remotely. The patient’s safety during the therapy is achieved through the integration of a fuzzy controller in the system control architecture. The fuzz...
Scientific Programming, 2019
Processor array architectures have been employed, as an accelerator, to compute similarity distan... more Processor array architectures have been employed, as an accelerator, to compute similarity distance found in a variety of data mining algorithms. However, most of the proposed architectures in the existing literature are designed in an ad hoc manner without taking into consideration the size and dimensionality of the datasets. Furthermore, data dependencies have not been analyzed, and often, only one design choice is considered for the scheduling and mapping of computational tasks. In this work, we present a systematic methodology to design scalable and area-efficient linear (1-D) processor arrays for the computation of similarity distance matrices. Six possible design options are obtained and analyzed in terms of area and time complexities. The obtained architectures provide us with the flexibility to choose the one that meets hardware constraints for a specific problem size. Comparisons with the previously reported architectures demonstrate that one of the proposed architectures a...
Applied Sciences, 2021
Radio-Frequency Identification (RFID) technology is a crucial technology used in many IoT applica... more Radio-Frequency Identification (RFID) technology is a crucial technology used in many IoT applications such as healthcare, asset tracking, logistics, supply chain management, assembly, manufacturing, and payment systems. Nonetheless, RFID-based IoT applications have many security and privacy issues restricting their use on a large scale. Many authors have proposed lightweight RFID authentication schemes based on Elliptic Curve Cryptography (ECC) with a low-cost implementation to solve these issues. Finite-field multiplication are at the heart of these schemes, and their implementation significantly affects the system’s overall performance. This article presents a formal methodology for developing a word-based serial-in/serial-out semisystolic processor that shares hardware resources for multiplication and squaring operations in GF(2n). The processor concurrently executes both operations and hence reduces the execution time. Furthermore, sharing the hardware resources provides saving...
Ain Shams Engineering Journal
Mathematics
The use of IoT technology in several applications is hampered by security and privacy concerns wi... more The use of IoT technology in several applications is hampered by security and privacy concerns with IoT edge nodes. Security flaws can only be resolved by implementing cryptographic protocols on these nodes. The resource constraints of the edge nodes make it extremely difficult to implement these protocols. The majority of cryptographic protocols’ fundamental operation is finite-field multiplication, and their performance is significantly impacted by their effective implementation. Therefore, this work mainly focuses on implementing low-area with low-energy and high-speed one-dimensional bit-parallel semi-systolic multiplier for the Montgomery multiplication algorithm. The space and delay complexity analysis of the proposed multiplier structure reveals that the proposed design has a significant reduction in delay and a marginal reduction in the area when compared to the competitive one-dimensional multipliers. The obtained ASIC synthesis report demonstrates that the suggested multip...
IEEE Canadian Journal of Electrical and Computer Engineering, 2021
This article presents a compact and efficient bit-parallel systolic array structure for multiplic... more This article presents a compact and efficient bit-parallel systolic array structure for multiplication over the extended binary field, GF(2<inline-formula> <tex-math notation="LaTeX">$^{m}$ </tex-math></inline-formula>). The systolic array has a regular arrangement with local connections, making it more suitable for VLSI implementations. Also, it has the merits of having hardware complexity of order <inline-formula> <tex-math notation="LaTeX">$\mathcal{O}(m)$ </tex-math></inline-formula> that distinguishes it from the previously reported bit-parallel designs having hardware complexity of order <inline-formula> <tex-math notation="LaTeX">$\mathcal{O}(m^{2})$ </tex-math></inline-formula>. The achieved results exhibited that the suggested parallel architecture realizes a significant reduction in hardware complexity and the area-delay complexity over the competitor architectures previously published in the literature. Therefore, it is more suitable for usage in constrained hardware environments, having more restrictions on space, such as portable devices and smart cards.
Aswan University Journal of Environmental Studies, 2021
Grass carp fishes were caught approximately in the same size (initial weight: 10 grams) from eart... more Grass carp fishes were caught approximately in the same size (initial weight: 10 grams) from earthen ponds and maintained in the laboratory in 15 glass aquaria (35 cm x 70 cm x 40 cm) containing 98L of filtered Nile water in 5 treatments (3 replicates per treatment) control, T1, T2, T3, T4 with stocking densities (10 fish/aquarium). The fish diet provided was a commercial floating pellets diet containing (30% protein, 6% lipids, fibers 4.5%, total energy not less than 4100-kilo calories / Kg) and Azolla plant which was cultivated. Fish fed at 5% of their body weight in the control group and replaced with Azolla plant in the T1, T2, T3, T4 with percentages 25,50,75,100 % respectively. The current study showed that replacing the artificial feed with Azolla pinnata positively enhanced the growth performance, haemato-biochemical values, of grass carp. These results indicated that Azolla pinnata with a rate of 25-50% can be considered a beneficial dietary supplement for grass carp.
2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES), 2016
This paper presents new scalable digit-serial inverter architecture with low circuit complexity t... more This paper presents new scalable digit-serial inverter architecture with low circuit complexity to perform inversion operation in GF(2m) based on a previously modified extended Euclidean algorithm. The architecture size can be modulated to be suitable for fixed size crypto processors used in embedded applications. Implementation results of the proposed design and previously reported efficient designs show that the proposed scalable structure achieves a significant reduction in area ranging from 83.0% to 88.3% and also achieves a significant saving in energy ranging from 75.0% to 85.0% over them, but it has lower throughput compared to them.
2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 2017
Field polynomial division can be found in applications such as error detection and data encoding ... more Field polynomial division can be found in applications such as error detection and data encoding for digital communication systems. In addition, it implements the extended Euclidean algorithm (EEA), which can be used as the field inversion building block of elliptic curve cryptosystem. The unpredictability of the iterative algorithm of polynomial division in the EEA-Based field inversion results in complex control function and higher CPD. Therefore, many attempts have been made to realize this process in systolic array architectures to be suitable for VLSI implementations. In this paper, binary polynomial division is revisited and the algorithm is analyzed to systematize its process. As a result, an iterative equation that is suitable for systolic array architectures is driven. Then, a systematic methodology for designing systolic arrays for such an algorithm is presented and utilized. Finally, the obtained architectures are discussed and compared with different proposed implementations in the literature.
2019 10th International Conference on Information and Communication Systems (ICICS), 2019
Processor array architecture is a popular approach to improve computation of similarity distance ... more Processor array architecture is a popular approach to improve computation of similarity distance matrices; however, most of the proposed architectures are designed in an ad hoc manner, some have not even considered dimensionality and size of the datasets. We believe a systematic approach is necessary to explore the design space. In this work, we present a technique for designing scalable processor array architecture for the similarity distance matrix computation. Implementation results of the proposed architecture show improved compromise between area and speed. Moreover, it scales better for large and high-dimensional datasets since the architecture is fully parameterized and only has to deal with one data dimension in each time step.
Applied Sciences, 2020
The last few years have seen significant advances in neuromotor rehabilitation technologies, such... more The last few years have seen significant advances in neuromotor rehabilitation technologies, such as robotics and virtual reality. Rehabilitation robotics primarily focuses on devices, control strategies, scenarios and protocols aimed at recovering sensory, motor and cognitive impairments often experienced by stroke victims. Remote rehabilitation can be adopted to relieve stress in healthcare facilities by limiting the movement of patients to clinics, mainly in the current COVID-19 pandemic. In this context, we have developed a remote controlled intelligent robot for elbow rehabilitation. The proposed system offers real-time monitoring and ultimately provides an electronic health record (EHR). Rehabilitation is an area of medical practice that treats patients with pain. However, this pain can prevent a person from positively interacting with therapy. To cope with this matter, the proposed solution incorporates a cascading fuzzy decision system to estimate patient pain. Indeed, as a ...
International Journal of Advanced Computer Science and Applications, 2021
With the continuous evolve of E-commerce systems, online reviews are mainly considered as a cruci... more With the continuous evolve of E-commerce systems, online reviews are mainly considered as a crucial factor for building and maintaining a good reputation. Moreover, they have an effective role in the decision making process for end users. Usually, a positive review for a target object attracts more customers and lead to high increase in sales. Nowadays, deceptive or fake reviews are deliberately written to build virtual reputation and attracting potential customers. Thus, identifying fake reviews is a vivid and ongoing research area. Identifying fake reviews depends not only on the key features of the reviews but also on the behaviors of the reviewers. This paper proposes a machine learning approach to identify fake reviews. In addition to the features extraction process of the reviews, this paper applies several features engineering to extract various behaviors of the reviewers. The paper compares the performance of several experiments done on a real Yelp dataset of restaurants reviews with and without features extracted from users behaviors. In both cases, we compare the performance of several classifiers; KNN, Naive Bayes (NB), SVM, Logistic Regression and Random forest. Also, different language models of n-gram in particular bi-gram and tri-gram are taken into considerations during the evaluations. The results reveal that KNN(K=7) outperforms the rest of classifiers in terms of f-score achieving best f-score 82.40%. The results show that the f-score has increased by 3.80% when taking the extracted reviewers behavioral features into consideration.
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL
The amplified connectivity of routine IoT entities can expose various security trajectories for c... more The amplified connectivity of routine IoT entities can expose various security trajectories for cybercriminals to execute malevolent attacks. These dangers are even amplified by the source limitations and heterogeneity of low-budget IoT/IIoT nodes, which create existing multitude-centered and fixed perimeter-oriented security tools inappropriate for vibrant IoT settings. The offered emulation assessment exemplifies the remunerations of implementing context aware co-design oriented cognitive security method in assimilated IIoT settings and delivers exciting understandings in the strategy execution to drive forthcoming study. The innovative features of our system is in its capability to get by with irregular system connectivity as well as node limitations in terms of scares computational ability, limited buffer (at edge node), and finite energy. Based on real-time analytical data, projected scheme select the paramount probable end-to-end security system possibility that ties with an a...
Mathematics
The Internet of Things (IoT) is an interconnected network of computing nodes that can send and re... more The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks...
Alexandria Engineering Journal
Adoption of IoT technology without considering its security implications may expose network syste... more Adoption of IoT technology without considering its security implications may expose network systems to a variety of security breaches. In network systems, IoT edge devices are a major source of security risks. Implementing cryptographic algorithms on most IoT edge devices can be difficult due to their limited resources. As a result, compact implementations of these algorithms on these devices are required. Because the field multiplication operation is at the heart of most cryptographic algorithms, its implementation will have a significant impact on the entire cryptographic algorithm implementation. As a result, in this paper, we propose a small hardware accelerator for performing field multiplication on edge devices. The hardware accelerator is primarily composed of a processor array with a regular structure and local interconnection among its processing elements. The main advantage of the proposed hardware structure is the ability to manage its area, delay, and consumed energy by choosing the appropriate word size l. We implemented the proposed structure using ASIC technology and the obtained results attain average savings in the area of 95.9%. Also, we obtained significant average savings in energy of 63.2%. The acquired results reveal that the offered hardware accelerator is appropriate for usage in resource-constrained IoT edge devices.
Micromachines
In this study, we present an IoT-based robot for wrist rehabilitation with a new protocol for det... more In this study, we present an IoT-based robot for wrist rehabilitation with a new protocol for determining the state of injured muscles as well as providing dynamic model parameters. In this model, the torque produced by the robot and the torque provided by the patient are determined and updated taking into consideration the constraints of fatigue. Indeed, in the proposed control architecture based on the EMG signal extraction, a fuzzy classifier was designed and implemented to estimate muscle fatigue. Based on this estimation, the patient’s torque is updated during the rehabilitation session. The first step of this protocol consists of calculating the subject-related parameters. This concerns axis offset, inertial parameters, passive stiffness, and passive damping. The second step is to determine the remaining component of the wrist model, including the interaction torque. The subject must perform the desired movements providing the torque necessary to move the robot in the desired ...
Mathematics, 2022
Security and privacy issues with IoT edge devices hinder the application of IoT technology in man... more Security and privacy issues with IoT edge devices hinder the application of IoT technology in many applications. Applying cryptographic protocols to edge devices is the perfect solution to security issues. Implementing these protocols on edge devices represents a significant challenge due to their limited resources. Finite-field multiplication is the core operation for most cryptographic protocols, and its efficient implementation has a remarkable impact on their performance. This article offers an efficient low-area and low-power one-dimensional bit-parallel systolic implementation for field multiplication in GF(2n) based on an irreducible all-one polynomial (AOP). We represented the adopted multiplication algorithm in the bit-level form to be able to extract its dependency graph (DG). We choose to apply specific scheduling and projection vectors to the DG to extract the bit-parallel systolic multiplier structure. In contrast with most of the previously published parallel structure...
Electronics, 2020
In recent times, vehicular ad hoc networks (VANET) have become a core part of intelligent transpo... more In recent times, vehicular ad hoc networks (VANET) have become a core part of intelligent transportation systems (ITSs), which aim to achieve continual Internet connectivity among vehicles on the road. The VANET has been used to improve driving safety and construct an ITS in modern cities. However, owing to the wireless characteristics, the message transmitted through the network can be observed, altered, or forged. Since driving safety is a major part of VANET, the security and privacy of these messages must be preserved. Therefore, this paper introduces an efficient privacy-preserving data transmission architecture that makes use of blockchain technology in cluster-based VANET. The cluster-based VANET architecture is used to achieve load balancing and minimize overhead in the network, where the clustering process is performed using the rainfall optimization algorithm (ROA). The ROA-based clustering with blockchain-based data transmission, called a ROAC-B technique, initially clust...
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2020
Robots are highly incorporated in rehabilitation in the last decade to compensate lost functions ... more Robots are highly incorporated in rehabilitation in the last decade to compensate lost functions in disabled individuals. By controlling the rehabilitation robots from far, many benefits are achieved. These benefits include but not restricted to minimum hospital stays, decreasing cost, and increasing the level of care. The main goal of this work is to have an effective solution to take care of patients from far. Tackling the problem of the remote control of rehabilitation robots is undergoing and highly challenging. In this paper, a remote wrist rehabilitation system is presented. The developed system is a sophisticated robot ensuring the two wrist movements (Flexion /extension and abduction/adduction). Additionally, the proposed system provides a software interface enabling the physiotherapists to control the rehabilitation process remotely. The patient’s safety during the therapy is achieved through the integration of a fuzzy controller in the system control architecture. The fuzz...
Scientific Programming, 2019
Processor array architectures have been employed, as an accelerator, to compute similarity distan... more Processor array architectures have been employed, as an accelerator, to compute similarity distance found in a variety of data mining algorithms. However, most of the proposed architectures in the existing literature are designed in an ad hoc manner without taking into consideration the size and dimensionality of the datasets. Furthermore, data dependencies have not been analyzed, and often, only one design choice is considered for the scheduling and mapping of computational tasks. In this work, we present a systematic methodology to design scalable and area-efficient linear (1-D) processor arrays for the computation of similarity distance matrices. Six possible design options are obtained and analyzed in terms of area and time complexities. The obtained architectures provide us with the flexibility to choose the one that meets hardware constraints for a specific problem size. Comparisons with the previously reported architectures demonstrate that one of the proposed architectures a...
Applied Sciences, 2021
Radio-Frequency Identification (RFID) technology is a crucial technology used in many IoT applica... more Radio-Frequency Identification (RFID) technology is a crucial technology used in many IoT applications such as healthcare, asset tracking, logistics, supply chain management, assembly, manufacturing, and payment systems. Nonetheless, RFID-based IoT applications have many security and privacy issues restricting their use on a large scale. Many authors have proposed lightweight RFID authentication schemes based on Elliptic Curve Cryptography (ECC) with a low-cost implementation to solve these issues. Finite-field multiplication are at the heart of these schemes, and their implementation significantly affects the system’s overall performance. This article presents a formal methodology for developing a word-based serial-in/serial-out semisystolic processor that shares hardware resources for multiplication and squaring operations in GF(2n). The processor concurrently executes both operations and hence reduces the execution time. Furthermore, sharing the hardware resources provides saving...
Ain Shams Engineering Journal
Mathematics
The use of IoT technology in several applications is hampered by security and privacy concerns wi... more The use of IoT technology in several applications is hampered by security and privacy concerns with IoT edge nodes. Security flaws can only be resolved by implementing cryptographic protocols on these nodes. The resource constraints of the edge nodes make it extremely difficult to implement these protocols. The majority of cryptographic protocols’ fundamental operation is finite-field multiplication, and their performance is significantly impacted by their effective implementation. Therefore, this work mainly focuses on implementing low-area with low-energy and high-speed one-dimensional bit-parallel semi-systolic multiplier for the Montgomery multiplication algorithm. The space and delay complexity analysis of the proposed multiplier structure reveals that the proposed design has a significant reduction in delay and a marginal reduction in the area when compared to the competitive one-dimensional multipliers. The obtained ASIC synthesis report demonstrates that the suggested multip...
IEEE Canadian Journal of Electrical and Computer Engineering, 2021
This article presents a compact and efficient bit-parallel systolic array structure for multiplic... more This article presents a compact and efficient bit-parallel systolic array structure for multiplication over the extended binary field, GF(2<inline-formula> <tex-math notation="LaTeX">$^{m}$ </tex-math></inline-formula>). The systolic array has a regular arrangement with local connections, making it more suitable for VLSI implementations. Also, it has the merits of having hardware complexity of order <inline-formula> <tex-math notation="LaTeX">$\mathcal{O}(m)$ </tex-math></inline-formula> that distinguishes it from the previously reported bit-parallel designs having hardware complexity of order <inline-formula> <tex-math notation="LaTeX">$\mathcal{O}(m^{2})$ </tex-math></inline-formula>. The achieved results exhibited that the suggested parallel architecture realizes a significant reduction in hardware complexity and the area-delay complexity over the competitor architectures previously published in the literature. Therefore, it is more suitable for usage in constrained hardware environments, having more restrictions on space, such as portable devices and smart cards.
Aswan University Journal of Environmental Studies, 2021
Grass carp fishes were caught approximately in the same size (initial weight: 10 grams) from eart... more Grass carp fishes were caught approximately in the same size (initial weight: 10 grams) from earthen ponds and maintained in the laboratory in 15 glass aquaria (35 cm x 70 cm x 40 cm) containing 98L of filtered Nile water in 5 treatments (3 replicates per treatment) control, T1, T2, T3, T4 with stocking densities (10 fish/aquarium). The fish diet provided was a commercial floating pellets diet containing (30% protein, 6% lipids, fibers 4.5%, total energy not less than 4100-kilo calories / Kg) and Azolla plant which was cultivated. Fish fed at 5% of their body weight in the control group and replaced with Azolla plant in the T1, T2, T3, T4 with percentages 25,50,75,100 % respectively. The current study showed that replacing the artificial feed with Azolla pinnata positively enhanced the growth performance, haemato-biochemical values, of grass carp. These results indicated that Azolla pinnata with a rate of 25-50% can be considered a beneficial dietary supplement for grass carp.
2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES), 2016
This paper presents new scalable digit-serial inverter architecture with low circuit complexity t... more This paper presents new scalable digit-serial inverter architecture with low circuit complexity to perform inversion operation in GF(2m) based on a previously modified extended Euclidean algorithm. The architecture size can be modulated to be suitable for fixed size crypto processors used in embedded applications. Implementation results of the proposed design and previously reported efficient designs show that the proposed scalable structure achieves a significant reduction in area ranging from 83.0% to 88.3% and also achieves a significant saving in energy ranging from 75.0% to 85.0% over them, but it has lower throughput compared to them.
2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 2017
Field polynomial division can be found in applications such as error detection and data encoding ... more Field polynomial division can be found in applications such as error detection and data encoding for digital communication systems. In addition, it implements the extended Euclidean algorithm (EEA), which can be used as the field inversion building block of elliptic curve cryptosystem. The unpredictability of the iterative algorithm of polynomial division in the EEA-Based field inversion results in complex control function and higher CPD. Therefore, many attempts have been made to realize this process in systolic array architectures to be suitable for VLSI implementations. In this paper, binary polynomial division is revisited and the algorithm is analyzed to systematize its process. As a result, an iterative equation that is suitable for systolic array architectures is driven. Then, a systematic methodology for designing systolic arrays for such an algorithm is presented and utilized. Finally, the obtained architectures are discussed and compared with different proposed implementations in the literature.
2019 10th International Conference on Information and Communication Systems (ICICS), 2019
Processor array architecture is a popular approach to improve computation of similarity distance ... more Processor array architecture is a popular approach to improve computation of similarity distance matrices; however, most of the proposed architectures are designed in an ad hoc manner, some have not even considered dimensionality and size of the datasets. We believe a systematic approach is necessary to explore the design space. In this work, we present a technique for designing scalable processor array architecture for the similarity distance matrix computation. Implementation results of the proposed architecture show improved compromise between area and speed. Moreover, it scales better for large and high-dimensional datasets since the architecture is fully parameterized and only has to deal with one data dimension in each time step.
Applied Sciences, 2020
The last few years have seen significant advances in neuromotor rehabilitation technologies, such... more The last few years have seen significant advances in neuromotor rehabilitation technologies, such as robotics and virtual reality. Rehabilitation robotics primarily focuses on devices, control strategies, scenarios and protocols aimed at recovering sensory, motor and cognitive impairments often experienced by stroke victims. Remote rehabilitation can be adopted to relieve stress in healthcare facilities by limiting the movement of patients to clinics, mainly in the current COVID-19 pandemic. In this context, we have developed a remote controlled intelligent robot for elbow rehabilitation. The proposed system offers real-time monitoring and ultimately provides an electronic health record (EHR). Rehabilitation is an area of medical practice that treats patients with pain. However, this pain can prevent a person from positively interacting with therapy. To cope with this matter, the proposed solution incorporates a cascading fuzzy decision system to estimate patient pain. Indeed, as a ...
International Journal of Advanced Computer Science and Applications, 2021
With the continuous evolve of E-commerce systems, online reviews are mainly considered as a cruci... more With the continuous evolve of E-commerce systems, online reviews are mainly considered as a crucial factor for building and maintaining a good reputation. Moreover, they have an effective role in the decision making process for end users. Usually, a positive review for a target object attracts more customers and lead to high increase in sales. Nowadays, deceptive or fake reviews are deliberately written to build virtual reputation and attracting potential customers. Thus, identifying fake reviews is a vivid and ongoing research area. Identifying fake reviews depends not only on the key features of the reviews but also on the behaviors of the reviewers. This paper proposes a machine learning approach to identify fake reviews. In addition to the features extraction process of the reviews, this paper applies several features engineering to extract various behaviors of the reviewers. The paper compares the performance of several experiments done on a real Yelp dataset of restaurants reviews with and without features extracted from users behaviors. In both cases, we compare the performance of several classifiers; KNN, Naive Bayes (NB), SVM, Logistic Regression and Random forest. Also, different language models of n-gram in particular bi-gram and tri-gram are taken into considerations during the evaluations. The results reveal that KNN(K=7) outperforms the rest of classifiers in terms of f-score achieving best f-score 82.40%. The results show that the f-score has increased by 3.80% when taking the extracted reviewers behavioral features into consideration.