Papers by Dr. Ahmed Elngar
DOAJ (DOAJ: Directory of Open Access Journals), Jul 1, 2022
The aim of this study is to evaluate the performance of the pre-trained models and compare them w... more The aim of this study is to evaluate the performance of the pre-trained models and compare them with the probability percentage of prediction in terms of execution time. This study uses the COCO dataset to evaluate both pre-trained image recognition and object detection, models. The results revealed that Tiny-YoloV3 is considered the best method for real-time applications as it takes less time. Whereas ResNet 50 is required for those applications which require a high probability percentage of prediction, such as medical image classification. In general, the rate of probability varies from 75% to 90% for the large objects in ResNet 50. Whereas in Tiny-YoloV3, the rate varies from 35% to 80% for large objects, besides it
Bookmarks Related papers MentionsView impact
Big Data Analytics and Intelligent Techniques for Smart Cities, 2021
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Social Science Research Network, 2022
Bookmarks Related papers MentionsView impact
CRC Press eBooks, Sep 16, 2021
Bookmarks Related papers MentionsView impact
Advances in systems analysis, software engineering, and high performance computing book series, Jun 16, 2023
The security aspects of neural networks (NN) have become a crucial and appropriate theme for basi... more The security aspects of neural networks (NN) have become a crucial and appropriate theme for basic research as a result of recent developments in neural networks and their use in deep learning techniques. In this research, the authors examine the security issues and potential solutions in computing hardware for deep neural networks (DNN). The latest hardware-based attacks against DNN are then described, with an emphasis on fault injection (FI), hardware Trojan (HT) insertion, and side-channel analysis (SCA). This chapter presents the various security issues in hardware-based attacks and security concerns in the hardware trojan (HT) and side-channel analysis are focused. Moreover, discussed the countermeasure for the hardware trojan and side channel attacks (SCA) is in neural networks.
Bookmarks Related papers MentionsView impact
Advances in systems analysis, software engineering, and high performance computing book series, Jun 16, 2023
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Smart innovation, systems and technologies, 2023
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Sensors, Jan 26, 2023
Bookmarks Related papers MentionsView impact
Handbook of Computational Sciences
Bookmarks Related papers MentionsView impact
IoT-enabled Convolutional Neural Networks: Techniques and Applications
Bookmarks Related papers MentionsView impact
A proposed stream cipher, RRSC-128AEAD, supports authenticated encryption with associated data (A... more A proposed stream cipher, RRSC-128AEAD, supports authenticated encryption with associated data (AEAD) for checking both the authenticity and integrity of the message. This cipher includes a key and a nonce of size 128-bit each as input. It produces two different pseudo-random bit streams in parallel. One is used for encryption and another one is used for authentication purposes. It generates 64-bit MAC, based on the National Institute of Standards and Technology standardized (NIST) value, for lightweight security. The cipher efficiency in terms of randomness is analyzed by an online NIST statistical test suite. The design is compared with NIST standardized stream cipher GRAIN-128AEAD. The proposed cipher proves its efficiency in key reintroduction and probability of avoiding key leakage compared to GRAIN-128AEAD. Although both cipher initialization times are the same, some features like two independent bit streams, large internal states, and variable-length associated data and maski...
Bookmarks Related papers MentionsView impact
Coronaviruses are a type of frequent RNA virus. They are responsible for digestive and respirator... more Coronaviruses are a type of frequent RNA virus. They are responsible for digestive and respiratory infections in animal and human genomes. A coronavirus renamed COVID-19 appeared and spread in the world which makes it declared in March 2020 a pandemic by the World Health Organization. SARS-CoV-2 genome, responsible for COVID-19 virus, has a size equal to 29,903 nucleotides, and its genetic makeup is composed of 11 functional open reading frames (ORFs). This paper proposes comparison algorithms to find SARS-Cov2 origin using digital genomic signatures. As a result, the five closest genomes related to SARS-CoV-2 are RaTG13, Pangolin-cov-PCoV_GX-P2V, Pangolin CoV MP789, bat-SL-CoVZC45 and bat-SL-CoVZXC21.
Bookmarks Related papers MentionsView impact
International Journal of pharma and Bio Sciences, 2020
Bookmarks Related papers MentionsView impact
Uploads
Papers by Dr. Ahmed Elngar
web service on the Internet. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Since, many researchers have proposed a number of password based authentication schemes which rely on a single channel for authentication. However to achieve a better security, it is possible to engage multi-channels for authenticating users. In this paper, we propose an efficient one time password (OTP) based authentication protocol over a multi-channels architecture. Where, the proposed protocol employing the RC4-EA encryption method to encrypt the plain-OTP to cipher-OTP. Then, Quick Response Code (QR) code is used as a data container to hide this cipher-OTP. Also, the purpose of the protocol is to integrate a web based application with mobile-based technology to communicate with the remote user over a multi-channels authentication scheme. The main advantage of the proposed protocol is to highly secure the authentication system by preventing the OTP from eavesdropping attack. Also, by integrating a Web-based application with mobile-based technology as a multi-channels scheme; the proposed protocol helps to overcome many challenging attacks such as replay attack, DoS attack, man-in-the-middle (MITM) attack, real-time phishing (RTP) and other malware attacks.
Keywords-Authentication; Multi-Channel Authentication (MCA); Data hiding; Quick Response Code (QR) code; Encryption.
Call for Papers:
https://sites.google.com/site/ijcsis/