Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Twitter is a popular social networking platform that is widely used in discussing and spreading information on global events. Twitter trending hashtags have been one of the topics for researcher to study and analyze. Understanding the... more
Twitter is a popular social networking platform that is widely used in discussing and spreading information on global events. Twitter trending hashtags have been one of the topics for researcher to study and analyze. Understanding the posting behavior patterns as the information flows increase by rapid events can help in predicting future events or detection manipulation. In this paper, we investigate similar-context trending hashtags to characterize general behavior of specific-trend and generic-trend within same context. We demonstrate an analysis to study and compare such trends based on spatial, temporal, content, and user activity. We found that the characteristics of similar-context trends can be used to predict future generic trends with analogous spatiotemporal, content, and user features. Our results show that more than 70% users participate in location-based hashtag belongs to the location of the hashtag. Generic trends aim to have more influence in users to participate than specific trends with geographical context. The retweet ratio in specific trends is higher than generic trends with more than 79%.
Online exams are the most preferred mode of exams in online learning environment. This mode of exam has been even more prevalent and a necessity in the event of a forced closure of face-to-face teaching such as the recent Covid-19... more
Online exams are the most preferred mode of exams in online learning environment. This mode of exam has been even more prevalent and a necessity in the event of a forced closure of face-to-face teaching such as the recent Covid-19 pandemic. Naturally, conducting online exams poses much greater challenge to preserving academic integrity compared to conducting on-site face-to-face exams. As there is no human proctor for policing the examinee on site, the chances of cheating are high. Various online exam proctoring tools are being used by educational institutes worldwide, which offer different solutions to reduce the chances of cheating. The most common technique followed by these tools is recording of video and audio of the examinee during the whole duration of exam. These videos can be analyzed later by human examiner to detect possible cheating case. However, viewing hours of exam videos for each student can be impractical for a large class and thus detecting cheating would be next to impossible. Although some AI-based tools are being used by some proctoring software to raise flags, they are not always very useful. In this paper we propose a cheating detection technique that analyzes an exam video to extract four types of event data, which are then fed to a pre-trained classification model for detecting cheating activity. We formulate the cheating detection problem as a multivariate time-series classification problem by transforming each video into a multivariate time-series representing the time-varying event data extracted from each frame of the video. We have developed a real dataset of cheating videos and conduct extensive experiments with varying video lengths, different deep learning and traditional machine learning models and feature sets, achieving prediction accuracy as high as 97.7%.
The advent of AI-empowered chatbots capable of constructing human-like sentences and articulating cohesive essays has captivated global interest. This paper provides a historical perspective on chatbots, focusing on the technology... more
The advent of AI-empowered chatbots capable of constructing human-like sentences and articulating cohesive essays has captivated global interest. This paper provides a historical perspective on chatbots, focusing on the technology underpinning the Chat Generative Pre-trained Transformer, better known as ChatGPT. We underscore the potential utility of ChatGPT across a multitude of fields, including healthcare, education, and research. To the best of our knowledge, this is the first review that not only highlights the applications of ChatGPT in multiple domains, but also analyzes its performance on examinations across various disciplines. Despite its promising capabilities, ChatGPT raises numerous ethical and privacy concerns that are meticulously explored in this paper. Acknowledging the current limitations of ChatGPT is crucial in understanding its potential for growth. We also ask ChatGPT to provide its point of view and present its responses to several questions we attempt to answer.
A simple supervised learning model can predict a class from trained data based on the previous learning process. Trust in such a model can be gained through evaluation measures that ensure fewer misclassification errors in prediction... more
A simple supervised learning model can predict a class from trained data based on the previous learning process. Trust in such a model can be gained through evaluation measures that ensure fewer misclassification errors in prediction results for different classes. This can be applied to supervised learning using a well-trained dataset that covers different data points and has no imbalance issues. This task is challenging when it integrates a semi-supervised learning approach with a dynamic data stream, such as social network data. In this paper, we propose a stream-based evolving bot detection (SEBD) framework for Twitter that uses a deep graph neural network. Our SEBD framework was designed based on multi-view graph attention networks using fellowship links and profile features. It integrates Apache Kafka to enable the Twitter API stream and predict the account type after processing. We used a probably approximately correct (PAC) learning framework to evaluate SEBD’s results. Our o...
With the continuous progress of renewable energy technology and the large-scale construction of microgrids, the architecture of power systems is becoming increasingly complex and huge. In order to achieve efficient and low-delay data... more
With the continuous progress of renewable energy technology and the large-scale construction of microgrids, the architecture of power systems is becoming increasingly complex and huge. In order to achieve efficient and low-delay data processing and meet the needs of smart grid users, emerging smart energy systems are often deployed at the edge of the power grid, and edge computing modules are integrated into the microgrids system, so as to realize the cost-optimal control decision of the microgrids under the condition of load balancing. Therefore, this paper presents a bilevel optimization control model, which is divided into an upper-level optimal control module and a lower-level optimal control module. The purpose of the two-layer optimization modules is to optimize the cost of the power distribution of microgrids. The function of the upper-level optimal control module is to set decision variables for the lower-level module, while the function of the lower-level module is to find ...
Twitter, as a popular social network, has been targeted by different bot attacks. Detecting social bots is a challenging task, due to their evolving capacity to avoid detection. Extensive research efforts have proposed different... more
Twitter, as a popular social network, has been targeted by different bot attacks. Detecting social bots is a challenging task, due to their evolving capacity to avoid detection. Extensive research efforts have proposed different techniques and approaches to solving this problem. Due to the scarcity of recently updated labeled data, the performance of detection systems degrades when exposed to a new dataset. Therefore, semi-supervised learning (SSL) techniques can improve performance, using both labeled and unlabeled examples. In this paper, we propose a framework based on the multi-view graph attention mechanism using a transfer learning (TL) approach, to predict social bots. We called the framework ‘Bot-MGAT’, which stands for bot multi-view graph attention network. The framework used both labeled and unlabeled data. We used profile features to reduce the overheads of the feature engineering. We executed our experiments on a recent benchmark dataset that included representative sam...
Metaverse has emerged as a novel technology with the objective to merge the physical world into the virtual world. This technology has seen a lot of interest and investment in recent times from prominent organizations including Facebook... more
Metaverse has emerged as a novel technology with the objective to merge the physical world into the virtual world. This technology has seen a lot of interest and investment in recent times from prominent organizations including Facebook which has changed its company name to Meta with the goal of being the leader in developing this technology. Although people in general are excited about the prospects of metaverse due to potential use cases such as virtual meetings and virtual learning environments, there are also concerns due to potential negative consequences. For instance, people are concerned about their data privacy as well as spending a lot of their time on the metaverse leading to negative impacts in real life. Therefore, this research aims to further investigate the public sentiments regarding metaverse on social media. A total of 86565 metaverse-related tweets were used to perform lexicon-based sentiment analysis. Furthermore, various machine and deep learning models with va...
With the wide application of advanced communication and information technology, false data injection attack (FDIA) has become one of the significant potential threats to the security of smart grid. Malicious attack detection is the... more
With the wide application of advanced communication and information technology, false data injection attack (FDIA) has become one of the significant potential threats to the security of smart grid. Malicious attack detection is the primary task of defense. Therefore, this paper proposes a method of FDIA detection based on vector auto-regression (VAR), aiming to improve safe operation and reliable power supply in smart grid applications. The proposed method is characterized by incorporating with VAR model and measurement residual analysis based on infinite norm and 2-norm to achieve the FDIA detection under the edge computing architecture, where the VAR model is used to make a short-term prediction of FDIA, and the infinite norm and 2-norm are utilized to generate the classification detector. To assess the performance of the proposed method, we conducted experiments by the IEEE 14-bus system power grid model. The experimental results demonstrate that the method based on VAR model has...
Digital arts have gained an unprecedented level of popularity with the emergence of non-fungible tokens (NFTs). NFTs are cryptographic assets that are stored on blockchain networks and represent a digital certificate of ownership that... more
Digital arts have gained an unprecedented level of popularity with the emergence of non-fungible tokens (NFTs). NFTs are cryptographic assets that are stored on blockchain networks and represent a digital certificate of ownership that cannot be forged. NFTs can be incorporated into a smart contract which allows the owner to benefit from a future sale percentage. While digital art producers can benefit immensely with NFTs, their production is time consuming. Therefore, this paper explores the possibility of using generative adversarial networks (GANs) for automatic generation of digital arts. GANs are deep learning architectures that are widely and effectively used for synthesis of audio, images, and video contents. However, their application to NFT arts have been limited. In this paper, a GAN-based architecture is implemented and evaluated for novel NFT-style digital arts generation. Results from the qualitative case study indicate that the generated artworks are comparable to the r...
Use of online social networks (OSNs) undoubtedly brings the world closer. OSNs like Twitter provide a space for expressing one’s opinions in a public platform. This great potential is misused by the creation of bot accounts, which spread... more
Use of online social networks (OSNs) undoubtedly brings the world closer. OSNs like Twitter provide a space for expressing one’s opinions in a public platform. This great potential is misused by the creation of bot accounts, which spread fake news and manipulate opinions. Hence, distinguishing genuine human accounts from bot accounts has become a pressing issue for researchers. In this paper, we propose a framework based on deep learning to classify Twitter accounts as either ‘human’ or ‘bot.’ We use the information from user profile metadata of the Twitter account like description, follower count and tweet count. We name the framework ‘DeeProBot,’ which stands for Deep Profile-based Bot detection framework. The raw text from the description field of the Twitter account is also considered a feature for training the model by embedding the raw text using pre-trained Global Vectors (GLoVe) for word representation. Using only the user profile-based features considerably reduces the feat...
Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection in remote areas due to their remote mobility. The collected data require processing close to the end-user to support delay-sensitive applications. In... more
Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection in remote areas due to their remote mobility. The collected data require processing close to the end-user to support delay-sensitive applications. In this paper, we proposed a data collection scheme and scheduling framework for smart farms. We categorized the proposed model into two phases: data collection and data scheduling. In the data collection phase, the IoT sensors are deployed randomly to form a cluster based on their RSSI. The UAV calculates an optimum trajectory in order to gather data from all clusters. The UAV offloads the data to the nearest base station. In the second phase, the BS finds the optimally available fog node based on efficiency, response rate, and availability to send workload for processing. The proposed framework is implemented in OMNeT++ and compared with existing work in terms of energy and network delay.
Cloud services are widely used to virtualize themanagement and actuation of the real-world the Internet ofThings (IoT). Due to the increasing privacy concerns regardingquerying untrusted cloud servers, query anonymity has becomea critical... more
Cloud services are widely used to virtualize themanagement and actuation of the real-world the Internet ofThings (IoT). Due to the increasing privacy concerns regardingquerying untrusted cloud servers, query anonymity has becomea critical issue to all the stakeholders which are related toassessment of the dependability and security of the IoT system. The paper presents our study on the problem of query receiver-anonymityin the cloud-based IoT system, where the trade-offbetween the offered query-anonymity and the incurred communicationis considered. The paper will investigate whether theaccepted worst-case communication cost is sufficient to achieve aspecific query anonymity or not. By way of extensive theoreticalanalysis, it shows that the bounds of worst-case communicationcost is quadratically increased as the offered level of anonymityis increased, and they are quadratic in the network diameter forthe opposite range. Extensive simulation is conducted to verifythe analytical assertions.
Many IT labs require virtualization technology as students need to learn several software tools and operating systems. In an online setting, students sometimes are expected to fill the role of an IT lab architect by installing,... more
Many IT labs require virtualization technology as students need to learn several software tools and operating systems. In an online setting, students sometimes are expected to fill the role of an IT lab architect by installing, configuring, deploying lab tasks on their personal computers, and deciding the virtualization technology needed. This can be intimidating and time-consuming for many students. Further, students often use traditional virtualization technology that is neither needed nor justified costing students significant time, effort, and computing resources. Existing studies discuss virtualization technology appropriateness in the context of industrial applications. This study, however, explores potential virtualization technologies that can be utilized in an academic setting by means of case studies that reflect our experience in transforming the labs of one of our courses. This study assesses virtualization technology suitability in online academic labs in terms of netwo...
The E2E security model has proven to be the successful security solution for enterprise business and personal applications. Existing wireless security mechanisms does not provide pure E2E security solutions. Realizing its importance, MIDP... more
The E2E security model has proven to be the successful security solution for enterprise business and personal applications. Existing wireless security mechanisms does not provide pure E2E security solutions. Realizing its importance, MIDP 2.0 provides full support to E2E wireless security, by including HTTPS, SSL/TLS, and X.509 PKI. MIDP 2.0 adopts several security concepts in its implementation reference such as protection domains, permission types, and authorization modes and trusted MIDlet. In general, the security analysis presented in this book reveals that, MIDP 2.0 provides a good solution to most of the E2E security problems. However, there are still a number of problems; most of these are related to the passive and active attacks that can target SSL handshake protocol, on-device bytecode verifier, X.509 PKI, and protection domains. In addition, the analysis also brings to light several ways to enhance the deployment and robustness of the MIDP 2.0 E2E security solutions. The...
Twitter is a popular social networking platform that is widely used in discussing and spreading information on global events. Twitter trending hashtags have been one of the topics for researcher to study and analyze. Understanding the... more
Twitter is a popular social networking platform that is widely used in discussing and spreading information on global events. Twitter trending hashtags have been one of the topics for researcher to study and analyze. Understanding the posting behavior patterns as the information flows increase by rapid events can help in predicting future events or detection manipulation. In this paper, we investigate similar-context trending hashtags to characterize general behavior of specific-trend and generic-trend within same context. We demonstrate an analysis to study and compare such trends based on spatial, temporal, content, and user activity. We found that the characteristics of similar-context trends can be used to predict future generic trends with analogous spatiotemporal, content, and user features. Our results show that more than 70% users participate in location-based hashtag belongs to the location of the hashtag. Generic trends aim to have more influence in users to participate than specific trends with geographical context. The retweet ratio in specific trends is higher than generic trends with more than 79%.
This paper presents a technique for computing patient similarity using time series data effectively combined with static data. Time series data of inpatients, such as heart rate, blood pressure, Oxygen saturation, respiration are measured... more
This paper presents a technique for computing patient similarity using time series data effectively combined with static data. Time series data of inpatients, such as heart rate, blood pressure, Oxygen saturation, respiration are measured at regular intervals, especially for inpatients in intensive care unit (ICU). The static data are mainly patient background and demographic data, including age, weight, height and gender. The similarity computation is done in unsupervised way. It is therefore free from data labeling requirement. However, such patient similarity can be very useful in developing various clinical decision support systems including treatment, medication, hospital admission and diagnosis. Our proposed technique works in three main steps. First, patient similarity is computed for each individual time series. Second, patients are grouped by clustering the static data. Finally, similarities from individual time series are combined and effectively blended with the patient group information to create a nearest neighborhood model. This model consists of a collection of the nearest neighbors for a given patient. We encounter several challenges for this task, including dealing with multi-variate time series data, variable sampling quantities and rates, missing values, and combining time-series with static data. We evaluate the proposed technique on a real patient database on two target features, namely, ‘diagnosis’ and ‘admission type’. Notable performance is recorded for both targets, achieving f1-score as high as 0.8. We believe this technique can effectively combine different types of clinical data and develop an efficient unsupervised framework for computing patient similarity to be utilized for clinical decision support systems.
Background: With the emergence and spread of new SARS-CoV-2 variants, concerns are raised about the effectiveness of the existing vaccines to protect against these new variants. Although many vaccines were found to be highly effective... more
Background: With the emergence and spread of new SARS-CoV-2 variants, concerns are raised about the effectiveness of the existing vaccines to protect against these new variants. Although many vaccines were found to be highly effective against the reference COVID-19 strain, the same level of protection may not be found against mutation strains. The objective of this study is to systematically review relevant studies in the literature and compare the efficacy of COVID-19 vaccines against new variants. Methods: We conducted a systematic review of research published in Scopus, PubMed, and Google Scholar until 30 August 2021. Studies including clinical trials, prospective cohorts, retrospective cohorts, and test negative case-controls that reported vaccine effectiveness against any COVID-19 variants were considered. PRISMA recommendations were adopted for screening, eligibility, and inclusion. Results: 129 unique studies were reviewed by the search criteria, of which 35 met the inclusion...
The last few years have revealed that social bots in social networks have become more sophisticated in design as they adapt their features to avoid detection systems. The deceptive nature of bots to mimic human users is due to the... more
The last few years have revealed that social bots in social networks have become more sophisticated in design as they adapt their features to avoid detection systems. The deceptive nature of bots to mimic human users is due to the advancement of artificial intelligence and chatbots, where these bots learn and adjust very quickly. Therefore, finding the optimal features needed to detect them is an area for further investigation. In this paper, we propose a hybrid feature selection (FS) method to evaluate profile metadata features to find these optimal features, which are evaluated using random forest, naïve Bayes, support vector machines, and neural networks. We found that the cross-validation attribute evaluation performance was the best when compared to other FS methods. Our results show that the random forest classifier with six optimal features achieved the best score of 94.3% for the area under the curve. The results maintained overall 89% accuracy, 83.8% precision, and 83.3% re...
In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However,... more
In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However, so far the concept of delegation in RBAC has not been studied. The basic idea behind delegation is that some active entity i n a system delegates authority to another active entity in order to carry out some functions on behalf of the former. User delegation in RBAC is the ability of one user (called the delegating user) who is a member of the delegated role to authorize another user (called the delegate user) to become a member of the delegated role. This paper extends a series of simple but practically useful models for delegation, described in the literature by Barka and Sandhu (3), and starts the development of a scheme of prototype implementation in order to validate these models. More specifically, this paper reviews the most recent Role-Based Access Control (RBAC) Implementations, analyzes the implementation techniques used in other forms of delegations (other than the human-to-human delegation), and designes and develops prototype implementations of user-to-user role delegation based on the Role-Based Delegation Models, in flat roles (RBDM0), and in hierarchical roles (RBDM1).
Research Interests:
... in the Lightweight Devices Ezedin S. Barka United Arab Emirates University PO Box: 17555 Al-Ain, UAE 971-3-7133125 ebarka@uaeu.ac.ae Emad Eldin Mohamed United Arab Emirates University PO Box: 17555 Al-Ain, UAE 971-3-7133668... more
... in the Lightweight Devices Ezedin S. Barka United Arab Emirates University PO Box: 17555 Al-Ain, UAE 971-3-7133125 ebarka@uaeu.ac.ae Emad Eldin Mohamed United Arab Emirates University PO Box: 17555 Al-Ain, UAE 971-3-7133668 emohamed@uaeu.ac.ae ...