bbabanner.jpg

Filter by

A New Scheme for Ransomware Classification and Clustering Using Static Features

Ransomware is a strain of malware that disables access to the user’s resources after infiltrating a victim’s system. Ransomware is one of the most dangerous malware organizations face by blocking data access or publishing private data over the internet. The major challenge of any entity is how to decrypt the files encrypted by ransomware. Ransomware’s binary analysis can provide a means to

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Text-Independent Algorithm for Source Printer Identification Based on Ensemble Learning

Because of the widespread availability of low-cost printers and scanners, document forgery has become extremely popular. Watermarks or signatures are used to protect important papers such as certificates, passports, and identification cards. Identifying the origins of printed documents is helpful for criminal investigations and also for authenticating digital versions of a document in today’s

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications

Using Knowledge Graph Embeddings in Embedding Based Recommender Systems

This paper proposes using entity2rec [1] which utilizes knowledge graph-based embeddings (node2vec) instead of traditional embedding layers in embedding based recommender systems. This opens the door to increasing the accuracy of some of the most implemented recommender systems running in production in many companies by just replacing the traditional embedding layer with node2vec graph embedding

Circuit Theory and Applications
Software and Communications

Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey

Nowadays events stream processing is one of the top demanding field(s) because of the business urgent need for ongoing real time analytics & decisions. Most business domains avail huge amount of data aiming to make use of each data point efficiently. Corporate(s) have a cloud of events vary from internal business transactions, social media feeds, IoT devices logs,.. etc. In this paper we would

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Performance Comparison of AODV and DSDV in Vehicular Ad Hoc Networks

Vehicle Ad-Hoc Networks (VANETs) are a special type of Mobile Ad-Hoc Network (MANETs). In VANETs, a group of vehicles communicates with each other to transfer data without a need for a fixed infrastructure. In this paper, we compare the performance of two routing protocols: Ad-hoc on Demand Distance Vector protocol (AODV) and Destination-Sequenced Distance Vector protocol (DSDV) in VANETs. We

Circuit Theory and Applications
Software and Communications

Automated multi-class skin cancer classification through concatenated deep learning models

Skin cancer is the most annoying type of cancer diagnosis according to its fast spread to various body areas, so it was necessary to establish computer-assisted diagnostic support systems. State-of-the-art classifiers based on convolutional neural networks (CNNs) are used to classify images of skin cancer. This paper tries to get the most accurate model to classify and detect skin cancer types

Artificial Intelligence
Healthcare
Circuit Theory and Applications
Software and Communications

Blackhole Attack effect on MANETs' Performance

Mobile Ad hoc networks (MANETs) facilitate the communication of devices with a limited communication range. A MANET can be described as a decentralized network with a constantly changing topology. This makes it vulnerable to different attacks. The black hole is one of the most dangerous attacks in MANETs. This paper discusses the Blackhole attack in a random mobility environment and analyses its

Circuit Theory and Applications
Software and Communications

Active Directory Attacks—Steps, Types, and Signatures

Active Directory Domain is a Microsoft service that allows and facilitates the centralized administration of all workstations and servers in any environment. Due to the wide use and adoption of this service, it has become a target for many attackers. Active Directory attacks have evolved through years. The attacks target different functions and features provided by Active Directory. In this paper

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Mechanical Design

Speech Emotion Recognition System for Arabic Speakers

The Speech Emotion Recognition (SER) system is one of the essential human-computer interface applications. Despite the rapid advancement of technology, there is still a gap in SER research in the Arabic language corpus. The goal of this research is to build an Arabic-based SER based on a feature set that has both high performance and low computational cost. Two novel feature sets were implemented

Artificial Intelligence
Circuit Theory and Applications

Dual-Level Sensor Selection with Adaptive Sensor Recovery to Extend WSNs’ Lifetime

Wireless sensor networks (WSNs) have garnered much attention in the last decades. Nowadays, the network contains sensors that have been expanded into a more extensive network than the internet. Cost is one of the issues of WSNs, and this cost may be in the form of bandwidth, computational cost, deployment cost, or sensors’ battery (sensor life). This paper proposes a dual-level sensor selection

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness