Teaching Documents by Dr.Ashraf Abu-Ein
Digital Logic Lab_Datasheet
Digital Logic Lab_Datasheet
Papers by Dr.Ashraf Abu-Ein
International journal of computer networks and communications, May 29, 2024
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (... more A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.

Research Square (Research Square), Jun 7, 2022
Arabic Dialect Identification is the process of identifying the speaker's dialect based on severa... more Arabic Dialect Identification is the process of identifying the speaker's dialect based on several features in the corresponding acoustic wave. In this research, machine learning models for detecting Arabic dialects from acoustic wave is proposed using ADI17 corpus with a short duration (i.e., less than 5 seconds) which contains 1717 wave files with a total of 2 hours, 2 minutes, and 11 seconds. The Mel-Frequency Cepstrum Coefficients (MFCC) and Triangular Filter Bank Cepstral Coefficients (TFCC) are used for features extraction from the input acoustic signal. The extracted features represent the speaker's features matrix which is used for automatic recognition based on K-Nearest Neighbor (KNN), Random Forest (RF), Multi-Layer Perceptron (MLP), and Artificial Neural Networks (ANN). The Experimental results are validated using MFCC features with an accuracy of 76% for KNN, 64% for RF, 41% for ANN, and 34% for the MLP model, while the obtained results using TFCC features were 62% for KNN, 60% for RF, 42% for ANN, and 33% for the MLP model.

International journal of online and biomedical engineering, Oct 19, 2022
Retinopathy is an eye disease caused by diabetes, and early detection and treatment can potential... more Retinopathy is an eye disease caused by diabetes, and early detection and treatment can potentially reduce the risk of blindness in diabetic retinopathy sufferers. Using retinal Fundus images, diabetic retinopathy can be diagnosed, recognized, and treated. In the current state of the art, sensitivity and specificity are lacking. However, there are still a number of problems to be solved in state-of-the-art techniques like performance, accuracy, and being able to identify DR disease effectively with greater accuracy. In this paper, we have developed a new approach based on a combination of image processing and artificial intelligence that will meet the performance criteria for the detection of disease-causing diabetes retinopathy in Fundus images. Automatic detection of diabetic retinopathy has been proposed and has been carried out in several stages. The analysis was carried out in MATLAB using software-based simulation, and the results were then compared with those of expert ophthalmologists to verify their accuracy. Different types of diabetic retinopathy are represented in the experimental evaluation, including exudates, micro-aneurysms, and retinal hemorrhages. The detection accuracies shown by the experiments are greater than 98.80 percent.

Face Recognition Method for Online Exams
2019 International Conference on Information Management and Technology (ICIMTech), 2019
In the development of this technology, biometric systems are highly developed for use in various ... more In the development of this technology, biometric systems are highly developed for use in various applications. Biometric systems are usually used to identify and analyze the characteristics of the human body such as fingerprints, retina, sound patterns, facial patterns and other body structures that can be used for system authentication. As well as facial recognition technology more and more used and developed for various applications including security systems, attendance systems or other things. As well as attendance system that is a recurring transaction because it is associated with controlling the presence of a person in activity. in the field of education, the attendance system is very important because the presence of students is part of a good assessment for teaching and learning. This research is to develop a prototype of face-based online exam application using the Eigenface method to detect student attendance.

International Journal of Online and Biomedical Engineering (iJOE)
Alzheimer Disease (AD) is the ordinary type of dementia which does not have any proper and effici... more Alzheimer Disease (AD) is the ordinary type of dementia which does not have any proper and efficient medication. Accurate classification and detection of AD helps to diagnose AD in an earlier stage, for that purpose machine learning and deep learning techniques are used in AD detection which observers both normal and abnormal brain and accurately detect AD in an early. For accurate detection of AD, we proposed a novel approach for detecting AD using MRI images. The proposed work includes three processes such as tri-level pre-processing, swin transfer based segmentation, and multi-scale feature pyramid fusion module-based AD detection.In pre-processing, noises are removed from the MRI images using Hybrid Kuan Filter and Improved Frost Filter (HKIF) algorithm, skull stripping is performed by Geodesic Active Contour (GAC) algorithm which removes the non-brain tissues that increases detection accuracy. Here, bias field correction is performed by Expectation-Maximization (EM) algorithm w...

International Journal of Online and Biomedical Engineering (iJOE)
Retinopathy is an eye disease caused by diabetes, and early detection and treatment can potential... more Retinopathy is an eye disease caused by diabetes, and early detection and treatment can potentially reduce the risk of blindness in diabetic retinopathy sufferers. Using retinal Fundus images, diabetic retinopathy can be diagnosed, recognized, and treated. In the current state of the art, sensitivity and specificity are lacking. However, there are still a number of problems to be solved in state-of-the-art techniques like performance, accuracy, and being able to identify DR disease effectively with greater accuracy. In this paper, we have developed a new approach based on a combination of image processing and artificial intelligence that will meet the performance criteria for the detection of disease-causing diabetes retinopathy in Fundus images. Automatic detection of diabetic retinopathy has been proposed and has been carried out in several stages. The analysis was carried out in MATLAB using software-based simulation, and the results were then compared with those of expert ophtha...

Indonesian Journal of Electrical Engineering and Computer Science
Deep learning has effectively solved complicated challenges ranging from large data analytics to ... more Deep learning has effectively solved complicated challenges ranging from large data analytics to human level control and computer vision. However, deep learning has been used to produce software that threatens privacy, democracy, and national security. Deepfake is one of these new applications backed by deep learning. Fake images and movies created by Deepfake algorithms might be difficult for people to tell apart from real ones. This necessitates the development of tools that can automatically detect and evaluate the quality of digital visual media. This paper provides an overview of the algorithms and datasets used to build deepfakes, as well as the approaches presented to detect deepfakes to date. By reviewing the background of deepfakes methods, this paper provides a complete overview of deepfake approaches and promotes the creation of new and more robust strategies to deal with the increasingly complex deepfakes.

Indonesian Journal of Electrical Engineering and Computer Science, 2022
Deep learning has effectively solved complicated challenges ranging from large data analytics to ... more Deep learning has effectively solved complicated challenges ranging from large data analytics to human level control and computer vision. However, deep learning has been used to produce software that threatens privacy, democracy, and national security. Deepfake is one of these new applications backed by deep learning. Fake images and movies created by Deepfake algorithms might be difficult for people to tell apart from real ones. This necessitates the development of tools that can automatically detect and evaluate the quality of digital visual media. This paper provides an overview of the algorithms and datasets used to build deepfakes, as well as the approaches presented to detect deepfakes to date. By reviewing the background of deepfakes methods, this paper provides a complete overview of deepfake approaches and promotes the creation of new and more robust strategies to deal with the increasingly complex deepfakes.
International Journal of Computer Applications
A novel methodology to manipulate wave file and create a feature array for each wave file will be... more A novel methodology to manipulate wave file and create a feature array for each wave file will be introduced, this array can be used later on to recognize the voice file. A set of experiments will be performed in order to prove the uniqueness of the calculated feature array, and that the created feature array for a certain wave file does not match any other feature array for other wave files. The proposed methodology will minimize the efforts of voice recognition by mean of minimizing the time of feature array creation and minimizing the size of the calculated array.

Bulletin of Electrical Engineering and Informatics
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tr... more Nowadays the security of multimedia data storage and transfer is becoming a major concern. The traditional encryption methods such as DES, AES, 3-DES, and RSA cannot be utilized for multimedia data encryption since multimedia data include an enormous quantity of redundant data, a very large size, and a high correlation of data elements. Chaos-based approaches have the necessary characteristics for dynamic multimedia data encryption. In the context of dynamical systems, chaos is extremely dependent on the initial conditions, non-convergence, non-periodicity, and exhibits a semblance of randomness. Randomness created from completely deterministic systems is a particularly appealing quality in the field of cryptography and information security. Since its inception in the early '90s, chaotic cryptography has seen a number of noteworthy changes. Throughout these years, several scientific breakthroughs have been made. This paper will give an overview of chaos-based cryptography and it...
SCHDRP: a 3D Wireless Sensor Networks Semi-Clustering and Hole Detection Routing Protocol
International Journal on Communications Antenna and Propagation (IRECAP), 2022

A split and merge video cryptosystem technique based on dual hash functions and Lorenz system
International Journal of High Performance Computing and Networking, 2021
Chaos-based cryptosystems and their behaviour in cryptography attract many scientists' an... more Chaos-based cryptosystems and their behaviour in cryptography attract many scientists' and researchers' attention in physics and computer science in recent decades. A new dynamic cryptosystem for video sequence based on the combination of chaotic Lorenz map and dual hash functions is proposed in this paper to improve the security level of the video applications. First, split up the video sequence into video frames and audio samples. Then, the initial conditions for both video and audio are generated using SHA-256 and MD5, respectively. Next, a higher dimensional Lorenz chaotic system is adopted to confuse and diffuse the audio samples and video frames components. Moreover, to improve the security level of the proposed cryptosystem against different types of cryptanalytic attacks, the concept of multi-key is employed. The security analysis is conducted and the results indicate that the presented cryptosystem satisfies the security requirements against various attacks and can be directly applied in the real life video applications.

Indonesian Journal of Electrical Engineering and Computer Science, 2022
Using a new key management system and Jacobian elliptic map, a new speech encryption scheme has b... more Using a new key management system and Jacobian elliptic map, a new speech encryption scheme has been developed for secure speech communication data. Jacobian elliptic map-based speech encryption has been developed as a novel method to improve the existing speech encryption methods' drawbacks, such as poor quality in decrypted signals, residual intelligibility, high computational complexity, and low-key space. Using the Jacobian elliptic map as a key management solution, a new cryptosystem was created. The proposed scheme's performance is evaluated using spectrogram analysis, histogram analysis, key space analysis, correlation analysis, key sensitivity analysis and randomness test analysis. Using the results, we can conclude that the proposed speech encryption scheme provides a better security system with robust decryption quality.
During driving Changing lanes can be very hazardous on a busy highway. There is region called “bl... more During driving Changing lanes can be very hazardous on a busy highway. There is region called “blind spot ” which is a problem for every car driver since it’s not covered by the driver’s mirrors. Relying solely on the mirrors while changing lane can lead to a collision with another vehicle. This paper focuses on this situation by ensuring that the blind spots of the vehicle are clear prior to the driver attempt to change lanes. This computer simulation incorporates the need for detection and warning of objects present within the blind spot on either side of the vehicle to the driver along with distance measurement of the object relative to the vehicle, incase the driver decides to change lanes. This simulation is constructed using the theory of embedded systems and will alert the driver if there is another car on the blind area.
An enhanced AODV routing protocol for MANETs
In this paper, a new routing protocol for Mobile Ad-Hoc networks (MANETs) is presented; the propo... more In this paper, a new routing protocol for Mobile Ad-Hoc networks (MANETs) is presented; the proposed power-hop based Ad-hoc on demand Distance Vector (AODV) is named PH-AODV, it uses the node power and the hop count parameters to select the best routing path. This paper compares the performance of the proposed PH-AODV in terms of average delay, average dropped packets and average throughput. Results

Journal of Computer Science, 2020
In this study the heartbeat sound signals were tackled by classifying them into heart disease cat... more In this study the heartbeat sound signals were tackled by classifying them into heart disease categories such as normal, artifact, murmur and extrahals in an attempt for early detection of heart defects. Phonocardiogram (i.e., PCG) is used to obtain the digital recording dataset of the heart sounds using an electronic stethoscope or mobile device. Multiple features are extracted from the digital recording dataset such as MFCC, Delta MFCC, FBANK and a combination between MFCC and FBANK features. Moreover, to classify the heartbeat sound signals, multiple well-known machine learning classifiers were used such as Naive Bays (NB), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), K-Nearest Neighbor (KNN) and Artificial Neural Network (ANN). The evaluation processes went through five metrics: Confusion matrix, accuracy, F1 score, precision and recall evaluating the recognition rate. Comparative experimental results show that the correctness of the feature with a best accuracy 99.2% adopted by MFCC and FBANK combination features which reduce false detection.
This paper demonstrated different networking sorting techniques and comparing between them. This ... more This paper demonstrated different networking sorting techniques and comparing between them. This paper also aims to calculate number of processors needed to make such sorting methods. The efficiency of such sorting methods is differ, it depends on time needed to execute some given tasks, some efficiency measures are developed or derived to make the comparison between such methods enabled. As the number of processors increases the time decreases. A suggested method which is consider to be a bitonic modified method depends on Fractal geometry principles that divide any collection of networks items into smaller and smaller groups then make sorting between the most small groups and go up to bigger one to get sorted items at the end of the time. The modified method required less processors to make same network sorting.
Problem statement : In this article the principles of building knowledge and retrieval informatio... more Problem statement : In this article the principles of building knowledge and retrieval information system will be applied to medical images in some studied hospital. Since there is a huge number of medical images this system will organizes and manages the operation of retrieving and displaying such images to the persons who need such images in short time and in high quality
Uploads
Teaching Documents by Dr.Ashraf Abu-Ein
Papers by Dr.Ashraf Abu-Ein