{"title":"A novel interest drift sensitivity academic paper recommender based on implicit feedback","authors":"Weiming Huang , Baisong Liu , Zhaoliang Wang","doi":"10.1016/j.eij.2024.100538","DOIUrl":"10.1016/j.eij.2024.100538","url":null,"abstract":"<div><div>Academic recommendation systems have been rapidly developed in recent years, helping researchers to find favorite paper. However, traditional methods applied to paper recommendation face more challenges. First, users can only read a small number of papers, resulting in a very sparse user-paper matrix, but the method based on random sampling of negative samples is ineffective due to the uncertainty of negative samples. And users’ academic interests shift frequently, so the approach that ignores temporal information is not applicable. To overcome the above challenges, this paper proposes an implicit feedback-based interest drift-aware academic paper recommendation algorithm. The algorithm explicitly integrates the user’s interest drift into the model through regularization. The algorithm alleviates sparsity by introducing contextual information through a multiplicative law and significantly reduces the computational complexity by using a caching approach. Experimental results on two real paper recommendation datasets show that the proposed method outperforms current methods in terms of recommendation accuracy and computational efficiency.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142424981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides","authors":"Abhigyan Nath , Sneha Pandey , Kottakkaran Sooppy Nisar , Anoop Kumar Tiwari","doi":"10.1016/j.eij.2024.100557","DOIUrl":"10.1016/j.eij.2024.100557","url":null,"abstract":"<div><div>The blood–brain barrier (BBB) poses a significant obstacle to the administration of drugs to the brain for the development of therapies of central nervous system (CNS) disorders. Blood-brain barrier penetrating peptides (BBBPps) are a group of peptides that can traverse the BBB by different processes without causing harm to the BBB. These peptides show promise as potential drugs for CNS ailments. Nevertheless, the process of identifying BBBPps using experimental approaches is both time-consuming and labour-intensive. To discover additional BBBPps as potential treatments for CNS diseases, it is critical to develop insilico methods that can distinguish BBBPps from non- BBBPps rapidly and precisely. In the current work, machine learning aided models are developed for accurate prediction of BBBPps using physicochemical and evolutionary information. The best model achieved an accuracy of 84.8 % by using 5-fold cross-validation and 79.8 % based on the holdout testing set on a reduced set of features. Further an extensive analysis is carried out for the black box models using model agnostic interpretation approaches to infer the physicochemical and sequence space of BBBPps. Basic amino acids and conservation of Arginine and Lysine are found to be more favoured in BBBPps. Further, basic amino acid property group and its interactions with other features are found to be prominent important interactions.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142424980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D path planning for UAV based on A hybrid algorithm of marine predators algorithm with quasi-oppositional learning and differential evolution","authors":"Binbin Tu , Fei Wang , Xiaowei Han","doi":"10.1016/j.eij.2024.100556","DOIUrl":"10.1016/j.eij.2024.100556","url":null,"abstract":"<div><div>3D path planning is a critical requirement for the autonomy of unmanned aerial vehicle (UAV) navigation systems. In this paper, we propose a novel approach, the differential evolution combined marine predators algorithm (DECMPA), specifically tailored to address the UAV 3D path planning problem in complex scenarios. To handle stringent constraints, DECMPA adopts a multi-step approach. Initially, it utilizes quasi-oppositional learning to generate a more uniformly distributed initial population. Throughout the iterative process, it probabilistically generates quasi-oppositional populations and merges them with existing populations, selecting the superior individuals for the next generation to mitigate local optima. Additionally, DECMPA integrates the variance, crossover, and selection processes of differential evolution into the marine predators algorithm iterations. The greedy selection of test and target vectors further accelerates population convergence. Numerical optimization experiments are conducted using the 10 and 20-dimensional CEC 2021 test suite. Compared to other algorithms, DECMPA exhibits superior solution accuracy and convergence speed, resulting in substantial performance enhancement, thus establishing itself as an efficient algorithm. Furthermore, the adoption of spherical vector coordinates in solution encoding ensures higher quality and facilitates the production of feasible solutions. To verify the effectiveness and practicality of the proposed algorithm, comprehensive path planning simulation experiments are conducted. DECMPA is compared against nine other state-of-the-art heuristic algorithms across six 3D scenarios of varying complexity. The experimental results demonstrate DECMPA’s superiority in terms of optimal cost acquisition, solution quality, and stability. In conclusion, DECMPA presents a promising solution for addressing the challenges of UAV 3D path planning in complex environments. Its innovative approach and superior performance underscore its potential for real-world application in autonomous UAV navigation systems.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142424982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sitharamulu , G. Sucharitha , Sachi Nandan Mohanty , Shaik Janbhasha , D. Kothandaraman
{"title":"A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts","authors":"V. Sitharamulu , G. Sucharitha , Sachi Nandan Mohanty , Shaik Janbhasha , D. Kothandaraman","doi":"10.1016/j.eij.2024.100542","DOIUrl":"10.1016/j.eij.2024.100542","url":null,"abstract":"<div><div>Modern organ transplant and donor procedures present numerous necessities and also obstacles related to Organ procurement, their delivery, and transplanting are all steps in the enrolment, matchmaking, and disposal process. These processes must adhere to various legal, clinical, ethical, and technical limitations. Consequently, there is a need for a comprehensive organ donation and transplantation system that ensures fairness, efficiency, and an improved experience for patients, ultimately fostering trust in the system. In this research paper, we introduce a ground-breaking solution based on the utilization of a private Ethereum blockchain. This approach revolutionizes the administration of organ gift and transplantation by establishing a copiously reorganized, sheltered, appreciable, auditable, cloistered, as well as truthful framework. Our solution is built upon the development of intelligent smart contracts and is accompanied by the presentation of six sophisticated algorithms, including their thorough enactment, trying, and endorsement procedures. To gauge the effectiveness of our projected result, we undertake an extensive evaluation encompassing privacy, security, and confidentiality analyses. Additionally, we conduct a comprehensive comparison against existing solutions to highlight the advantages and advancements offered by our system. By leveraging the potential of blockchain technology and incorporating smart contracts, our solution addresses the complexities and limitations that have plagued organ donation and transplantation systems. This research aims to enhance the overall efficacy and slide of the procedure, ultimately benefiting disease one in require of life-saving tissue relocates.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142424983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saba Inam , Shamsa Kanwal , Anousha Anwar , Noor Fatima Mirza , Hessa Alfraihi
{"title":"Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network","authors":"Saba Inam , Shamsa Kanwal , Anousha Anwar , Noor Fatima Mirza , Hessa Alfraihi","doi":"10.1016/j.eij.2024.100541","DOIUrl":"10.1016/j.eij.2024.100541","url":null,"abstract":"<div><div>The Internet of Medical Things (IoMT) links medical devices and wearable, enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to retain confidentiality, prevent tampering, ensure authenticity, and secure data transfer. The intricate neural network architecture of deep learning models adds a layer of complexity and non-linearity to the encryption process, rendering it highly resistant to plaintext attacks. Specifically, the Cycle_GAN network is used as the leading learning network. This work suggests deep learning-based encryption for medical images using Cycle_GAN, a Generative Adversarial Network. Cycle_GAN changes images without paired training data that improves quality and feature preservation. Unlike conventional image-to-image translation techniques, Cycle_GAN doesn’t require a dataset with corresponding input–output pairs. Traditional methods typically needs paired data to learn the mapping between input and output images. Paired data can be challenging to obtain, specifically in medical imaging where gathering and annotating data can be time-consuming, laborious and expensive. The use of Cycle_GAN overwhelms this constraint by using unpaired data, where the input and output images are not explicitly paired. This method ensures confidentiality, authenticity, and secure transfer. Cycle_GAN consists of two major components: a generator used to modify the images, and a discriminator used to distinguish between real and fake images. Further, the Binary-Cross Entropy loss function is employed to train the network for precise predictions. The experiments are carried out on skin cancer datasets. The results demonstrate high-level efficient, systematic and coherent encryption as compared with other modernized medical image encryption methods. The proposed technique offers several benefits, including efficient encryption and decryption and robustness against unauthorized access.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142323947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laid Kenioua , Brahim Lejdel , Sultan Alamri , Qusai Ramadan
{"title":"A password-based authentication approach for edge computing architectures","authors":"Laid Kenioua , Brahim Lejdel , Sultan Alamri , Qusai Ramadan","doi":"10.1016/j.eij.2024.100543","DOIUrl":"10.1016/j.eij.2024.100543","url":null,"abstract":"<div><div>Due to its benefits of low delay and fast response, edge computing has become an essential aid to cloud computing technology and has introduced new options for smart applications. By offloading some of the data processing tasks to the network’s edge, edge computing complements cloud computing. Nevertheless, adopting edge computing introduces several security challenges that must be addressed to ensure safety and reliability. One major concern is data privacy, as sensitive information processed at the edge must be protected from unauthorized access and breaches. Implementing strong encryption, secure authentication protocols, and regular software updates are some of the strategies necessary to enhance security in edge computing environments. In this paper, we present a robust and lightweight mutual authentication technique that is perfectly suited to low devices that can benefit from the edge computing paradigm. After the registration phase, the authentication process can be made in two rounds, the edge node and user can easily authenticate each other. Our approach is evaluated with regard to communication and computation costs realizing 982 bits and 5.955 ms respectively. analysis and experiments prove the high performance of the proposed technique.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524001063/pdfft?md5=042060e47f5b703632c06800710f91ac&pid=1-s2.0-S1110866524001063-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A clustering approach for classifying scholars based on publication performance using bibliometric data","authors":"Ali Pişirgen , Serhat Peker","doi":"10.1016/j.eij.2024.100537","DOIUrl":"10.1016/j.eij.2024.100537","url":null,"abstract":"<div><div>This study introduces a clustering framework that effectively evaluate scholars’ publication performance by utilizing cluster analysis and bibliometric data. In order to capture the various aspects of scholars’ publication characteristics, our proposed framework integrates four distinct features, namely “APIR” which represents Academic age, Productivity, Impact, and Recency. The proposed framework is implemented in a case study focusing on Turkish academia, utilizing a dataset comprising 13,070 scholars from 24 diverse academic divisions across 30 Turkish universities. Cluster analysis yields seven groups of scholars with diverse publishing characteristic based on APIR features and these obtained clusters are profiled as “freshmen”, “stagnant impactful mids”, “rising stars”, “stagnant and non-prolific juniors”, “stagnant impactful seniors”, “super stars”, “currently active and prolific seniors”. To enhance the cluster analysis results, additional cross analysis is performed based on scholars’ certain demographics such as affiliating institutes, divisions, academic titles, and PhD qualification. Scholars in clusters with superior publication performance are often affiliated with top-ranked universities and have academic backgrounds in the fields of Medicine, Engineering, and Natural Sciences. Practically, generated scholar segments and analysis based on these scholar profiles can serve as useful input for policy makers during having decisions about recruitment, promotion, awarding and allocation of funds.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524001002/pdfft?md5=bbc9856409623c1d5701432705a799f7&pid=1-s2.0-S1110866524001002-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hesham A. Sakr , Mostafa M. Fouda , Ahmed F. Ashour , Ahmed Abdelhafeez , Magda I. El-Afifi , Mohamed Refaat Abdellah
{"title":"Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems","authors":"Hesham A. Sakr , Mostafa M. Fouda , Ahmed F. Ashour , Ahmed Abdelhafeez , Magda I. El-Afifi , Mohamed Refaat Abdellah","doi":"10.1016/j.eij.2024.100540","DOIUrl":"10.1016/j.eij.2024.100540","url":null,"abstract":"<div><p>With the growing integration of IoT devices in critical infrastructure, cybersecurity threats such as Distributed Denial of Service (DDoS) attacks on Energy Hubs (EH) have become a significant concern. This study aims to address these challenges by evaluating the effectiveness of various supervised machine learning (ML) algorithms in predicting DDoS attacks targeting EH systems through IoT devices. Using the CICDDOS2019 and KDD-CUP datasets, a comprehensive analysis was conducted on several classifiers, including Decision Tree (DT), Gradient Boosting, Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Random Forest. The results highlight Gradient Boosting as the most effective model, particularly for the CICDDOS2019 dataset, demonstrating superior accuracy and predictive capability. Additionally, hybrid models combining Gradient Boosting with SVM or DT showed strong performance, though with varying precision and recall. This study provides valuable insights into the selection and tailoring of ML models for specific security challenges, emphasizing the need for ongoing research to enhance the resilience of EH systems and IoT devices against evolving DDoS threats.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524001038/pdfft?md5=c152411211f2d1ecb3239e35c09f18be&pid=1-s2.0-S1110866524001038-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks","authors":"K. Sedhuramalingam , N. Saravanakumar","doi":"10.1016/j.eij.2024.100522","DOIUrl":"10.1016/j.eij.2024.100522","url":null,"abstract":"<div><p>A wireless sensor network contains many nodes to collect and transfer data to a primary location. However, wireless sensor networks have several security issues because of their resource-constrained nodes, deployment tactics, and communication channels. As a result, detecting intrusions is crucial for strengthening the safety of wireless sensor networks. Naturally, any communication network will need the services provided by a network intrusion detection system. Despite their everyday use in intrusion detection systems, the efficacy of machine learning (ML) approaches needs to be improved for handling asymmetrical attacks. This article proposes an intrusion detection system based on an Improved deep neural network (IDNN) to solve this issue and enhance performance. Using the global search strategy of the coyote optimization algorithm (COA-GS) on the KDDCup 99 and WSN-DS datasets, the following hyperparameter selection techniques are used to determine network topologies and the optimal network parameters for DNNs. The most efficient algorithm for detecting future cyberattacks can be chosen by conducting such research. Extensive studies comparing COA-GS-IDNNs and other standard machine learning classifications on a large number of openly accessible malware benchmark datasets are presented. Extensive experimental testing demonstrates that DNNs outperform conventional machine learning classifiers at real-time monitoring network activity and host-level events to detect and prevent intrusions.The experimental outcomes demonstrate that the suggested COA-GS-IDNN model increases the accuracy ratio of 95 %, the precision ratio of 94 %, recall ratio of 96 %, F1-score ratio of 95 %, ROC AUC ratio 98 %, detection time of 1.0068754, and delay of 0.8016 ms compared to other existing models.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000859/pdfft?md5=786d303351ef6e91c9885885ffda1542&pid=1-s2.0-S1110866524000859-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aamer Bilal Asghar , Maham Majeed , Abdullah Taseer , Muhammad Burhan Khan , Khazina Naveed , Mujtaba Hussain Jaffery , Ahmed Sayed Mohammed Metwally , Krzysztof Ejsmont , Mirosław Nejman
{"title":"Classification and monitoring of arm exercises using machine learning and wrist-worn band","authors":"Aamer Bilal Asghar , Maham Majeed , Abdullah Taseer , Muhammad Burhan Khan , Khazina Naveed , Mujtaba Hussain Jaffery , Ahmed Sayed Mohammed Metwally , Krzysztof Ejsmont , Mirosław Nejman","doi":"10.1016/j.eij.2024.100534","DOIUrl":"10.1016/j.eij.2024.100534","url":null,"abstract":"<div><p>Exercise is essential for a healthy lifestyle, thus it is important to consider how to keep proper posture when performing arm exercises at home. This work uses wrist-worn bands with the MPU6050 sensor to address these issues, which collects motion data using acceleration measurements. The individuals in the dataset are completing a variety of activities at varying ranges of motion. Machine learning-based classification methods are then applied after the pre-processing and feature extraction of the gathered data. An App prototype integrated with a WiFi module and Cloud infrastructure is created to enable real-time data collecting and storage. The Arduino IDE is used to send the collected data to the ThingSpeak platform, where it is subsequently sent to MATLAB for additional analysis. The studied data is then returned to ThingSpeak, where the program displays the findings. This approach reduces the risk of injuries caused by bad posture by enabling people to continue regular workouts at home without requiring a personal trainer or a particular environment. The findings of this work shed important light on the performance of Boosted Trees, Quadratic SVM, Subspace KNN, and Fine KNN algorithms for arm exercises employing a wrist-worn band with an MPU6050 sensor. The Fine KNN has the highest accuracy of 91.3% among all implemented algorithms.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000975/pdfft?md5=f84bbdb09921e3c8c928c9b8d117237b&pid=1-s2.0-S1110866524000975-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}