Browsing by Author "Usman, Aminu Bello"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Open Access A Machine Learning Approach for Earthquake Prediction in Various Zones Based on Solar Activity(World Academy of Science, 2024) Rehman, Mujeeb Ur; Shkuratskyy, Viacheslav; Usman, Aminu Bello; O’Dea, Michael; Sabuj, Saifur RahmanThis paper examines relationships between solar activity and earthquakes, it applied machine learning techniques: Knearest neighbour, support vector regression, random forest regression, and long short-term memory network. Data from the SILSO World Data Center, the NOAA National Center, the GOES satellite, NASA OMNIWeb, and the United States Geological Survey were used for the experiment. The 23rd and 24th solar cycles, daily sunspot number, solar wind velocity, proton density, and proton temperature were all included in the dataset. The study also examined sunspots, solar wind, and solar flares, which all reflect solar activity, and earthquake frequency distribution by magnitude and depth. The findings showed that the long short-term memory network model predicts earthquakes more correctly than the other models applied in the study, and solar activity is more likely to effect earthquakes of lower magnitude and shallow depth than earthquakes of magnitude 5.5 or larger with intermediate depth and deep depth.Item Open Access Enhancing Image Security via Chaotic Maps, Fibonacci, Tribonacci Transformations, and DWT Diffusion: A Robust Data Encryption Approach(Springer Nature, 2024-05-29) Rehman, Mujeeb Ur; Hazzazi, Mohammad Mazyad; Shafique, Arslan; Aljaedi, Amer; Bassfar, Zaid; Usman, Aminu BelloIn recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security and real-time applications. While a few of them outperform in terms of robust security, others perform well for real-time applications where less processing time is required. Balancing these two aspects poses a challenge, aiming to achieve efficient encryption without compromising security. To address this challenge, the proposed research presents a robust data security approach for encrypting grayscale images, comprising five key phases. The first and second phases of the proposed encryption framework are dedicated to the generation of secret keys and the confusion stage, respectively. While the level-1, level-2, and level-2 diffusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image, followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shuffling. To enhance security, Tribonacci Transformation (TT) creates level-1 diffusion in the permuted image. Level-2 diffusion is introduced to further strengthen the diffusion within the plaintext image, which is achieved by decomposing the diffused image into eight-bit planes and implementing XOR operations with corresponding bit planes that are extracted from the key image. After that, the discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency sub-band (high-frequency sub-band) is substituted using the substitution box process. This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. Several statistical tests, including mean square error analysis, histogram variance analysis, entropy assessment, peak signal-to-noise ratio evaluation, correlation analysis, key space evaluation, and key sensitivity analysis, demonstrate the effectiveness of the proposed work. The proposed encryption framework achieves significant statistical values, with entropy, correlation, energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively. These results contribute to its robustness against cyberattacks. Moreover, the processing time of the proposed encryption framework is less than one second, which makes it more suitable for real-world applications. A detailed comparative analysis with the existing methods based on chaos, DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed encryption scheme outperforms the existing ones.Item Open Access Securing Medical Information Transmission Between IoT Devices: An Innovative Hybrid Encryption Scheme Based on Quantum Walk, DNA Encoding, and Chaos(Elsevier, 2023-08-25) Rehman, Mujeeb Ur; Shafique, Arslan; Usman, Aminu BelloThe healthcare industry has undergone a transformation due to the widespread use of advanced communication technologies and wireless sensor networks such as the Internet of Medical Things (IoMT), Health Information Exchange Technology (HIET), Internet of Healthcare Things (IoHT) and Health IoT (HIoT). These technologies have led to an increase in the transmission of medical data, particularly medical imaging data, over various wireless communication channels. However, transmitting high-quality color medical images over insecure internet channels like the Internet and communication networks like 5G presents significant security risks that could threaten patients’ data privacy. Furthermore, this process can also burden the limited bandwidth of the communication channel, leading to delayed data transmission. To address security concerns in healthcare data, researchers have focused a lot of attention on medical image encryption as a means of protecting patient data. This paper presents a color image encryption scheme that integrates multiple encryption techniques, including alternate quantum random walks, controlled Rubik’s Cube transformations, and the integration of the Elliptic Curve Cryptosystem with Hill Cipher (ECCHC). The proposed scheme divides various plaintext images by creating a regular cube by layering planes of a fixed size. Each plane is rotated in an anticlockwise direction, followed by row, column and face swapping, and then DNA encoding is performed. The image cube encoded with DNA is combined with the chaotic cube through DNA addition, and a couple of random DNA sequences are chosen for DNA mutation. After undergoing DNA mutation, the encoded cube is then decoded using DNA. The proposed method has the theoretical capability of encrypting 2D images of unlimited size and number by utilizing an infinitely large cube. The proposed image encryption scheme has been rigorously tested through various experimental simulations and cyberattack analysis, which shows the efficiency and reliability of the proposed encryption scheme.Item Open Access Voice disorder detection using machine learning algorithms: An application in speech and language pathology(Elsevier, 2024-02-08) Rehman, Mujeeb Ur; Usman, Aminu Bello; Shafique, Arslan; Azhar, Qurat-Ul-Ain; Jamal, Sajjad Shaukat; Gheraibia, YoucefThe healthcare industry is currently seeing a significant rise in the use of mobile devices. These devices not only provide ways for communication and sharing of multimedia information, such as clinical notes and medical records, but also offer new possibilities for people to detect, monitor, and manage their health from anywhere at any time. Digital health technologies have the potential to improve patient care by making it more efficient, effective, and cost-effective. Utilizing digital devices and technologies can have a positive impact on many health conditions. This research focuses on dysphonia, a change in the sound of the voice that affects around one-third of individuals at some point in their lives. Voice disorders are becoming more common, despite being often overlooked. Mobile healthcare systems can provide quick and efficient assistance for detecting voice disorders. To make these systems reliable and accurate, it is important to develop an algorithm that can classify intelligently healthy and pathological voices. To achieve this task, we utilized a combination of several datasets such as Saarbruecken voice dataset (SVD), the Massachusetts Eye and Ear Infirmary database (MEEI), and a few private datasets of various voices (healthy and pathological) Additionally, we applied multiple machine learning algorithms, including decision tree, random forest, and support vector machine, to evaluate and determine the most effective algorithm among them for the detection of voice disorders. The experimental analyses are performed in terms of sensitivity, accuracy, receiver operating characteristic area, specificity, F-score and recall. The results demonstrated that the support vector machine algorithm, depending on the features selected by using appropriate feature selection methods, proved to be the most accurate in detecting voice diseases.