Malmö University Publications
Change search
Link to record
Permanent link

Direct link
Alawadi, Sadi
Publications (10 of 11) Show all publications
Fakhouri, H. N., Alawadi, S., Awaysheh, F. M., Alkhabbas, F. & Zraqou, J. (2024). A cognitive deep learning approach for medical image processing. Scientific Reports, 14(1), Article ID 4539.
Open this publication in new window or tab >>A cognitive deep learning approach for medical image processing
Show others...
2024 (English)In: Scientific Reports, E-ISSN 2045-2322, Vol. 14, no 1, article id 4539Article in journal (Refereed) Published
Abstract [en]

In ophthalmic diagnostics, achieving precise segmentation of retinal blood vessels is a critical yet challenging task, primarily due to the complex nature of retinal images. The intricacies of these images often hinder the accuracy and efficiency of segmentation processes. To overcome these challenges, we introduce the cognitive DL retinal blood vessel segmentation (CoDLRBVS), a novel hybrid model that synergistically combines the deep learning capabilities of the U-Net architecture with a suite of advanced image processing techniques. This model uniquely integrates a preprocessing phase using a matched filter (MF) for feature enhancement and a post-processing phase employing morphological techniques (MT) for refining the segmentation output. Also, the model incorporates multi-scale line detection and scale space methods to enhance its segmentation capabilities. Hence, CoDLRBVS leverages the strengths of these combined approaches within the cognitive computing framework, endowing the system with human-like adaptability and reasoning. This strategic integration enables the model to emphasize blood vessels, accurately segment effectively, and proficiently detect vessels of varying sizes. CoDLRBVS achieves a notable mean accuracy of 96.7%, precision of 96.9%, sensitivity of 99.3%, and specificity of 80.4% across all of the studied datasets, including DRIVE, STARE, HRF, retinal blood vessel and Chase-DB1. CoDLRBVS has been compared with different models, and the resulting metrics surpass the compared models and establish a new benchmark in retinal vessel segmentation. The success of CoDLRBVS underscores its significant potential in advancing medical image processing, particularly in the realm of retinal blood vessel segmentation.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Algorithms, Cognition, Deep Learning, Fundus Oculi, Humans, Computer-Assisted Image Processing/methods, Retinal Vessels/diagnostic imaging
National Category
Medical Imaging Computer graphics and computer vision
Identifiers
urn:nbn:se:mau:diva-66272 (URN)10.1038/s41598-024-55061-1 (DOI)001177317400011 ()38402321 (PubMedID)2-s2.0-85186271613 (Scopus ID)
Available from: 2024-03-08 Created: 2024-03-08 Last updated: 2025-02-09Bibliographically approved
Alawadi, S., Alkharabsheh, K., Alkhabbas, F., Kebande, V. R., Awaysheh, F. M., Palomba, F. & Awad, M. (2024). FedCSD: A Federated Learning Based Approach for Code-Smell Detection. IEEE Access, 12, 44888-44904
Open this publication in new window or tab >>FedCSD: A Federated Learning Based Approach for Code-Smell Detection
Show others...
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 44888-44904Article in journal (Refereed) Published
Abstract [en]

Software quality is critical, as low quality, or "Code smell," increases technical debt and maintenance costs. There is a timely need for a collaborative model that detects and manages code smells by learning from diverse and distributed data sources while respecting privacy and providing a scalable solution for continuously integrating new patterns and practices in code quality management. However, the current literature is still missing such capabilities. This paper addresses the previous challenges by proposing a Federated Learning Code Smell Detection (FedCSD) approach, specifically targeting "God Class," to enable organizations to train distributed ML models while safeguarding data privacy collaboratively. We conduct experiments using manually validated datasets to detect and analyze code smell scenarios to validate our approach. Experiment 1, a centralized training experiment, revealed varying accuracies across datasets, with dataset two achieving the lowest accuracy (92.30%) and datasets one and three achieving the highest (98.90% and 99.5%, respectively). Experiment 2, focusing on cross-evaluation, showed a significant drop in accuracy (lowest: 63.80%) when fewer smells were present in the training dataset, reflecting technical debt. Experiment 3 involved splitting the dataset across 10 companies, resulting in a global model accuracy of 98.34%, comparable to the centralized model's highest accuracy. The application of federated ML techniques demonstrates promising performance improvements in code-smell detection, benefiting both software developers and researchers.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Software quality, technical debit, federated learning, privacy-preserving, code smell detection
National Category
Software Engineering
Identifiers
urn:nbn:se:mau:diva-66923 (URN)10.1109/ACCESS.2024.3380167 (DOI)001193664800001 ()2-s2.0-85189169469 (Scopus ID)
Available from: 2024-04-26 Created: 2024-04-26 Last updated: 2024-09-03Bibliographically approved
Alkhabbas, F., Alawadi, S., Ayyad, M., Spalazzese, R. & Davidsson, P. (2023). ART4FL: An Agent-Based Architectural Approach for Trustworthy Federated Learning in the IoT. In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC): . Paper presented at 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Tartu, Estonia, 18-20 September 2023. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>ART4FL: An Agent-Based Architectural Approach for Trustworthy Federated Learning in the IoT
Show others...
2023 (English)In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper, Published paper (Refereed)
Abstract [en]

The integration of the Internet of Things (IoT) and Machine Learning (ML) technologies has opened up for the development of novel types of systems and services. Federated Learning (FL) has enabled the systems to collaboratively train their ML models while preserving the privacy of the data collected by their IoT devices and objects. Several FL frameworks have been developed, however, they do not enable FL in open, distributed, and heterogeneous IoT environments. Specifically, they do not support systems that collect similar data to dynamically discover each other, communicate, and negotiate about the training terms (e.g., accuracy, communication latency, and cost). Towards bridging this gap, we propose ART4FL, an end-to-end framework that enables FL in open IoT settings. The framework enables systems' users to configure agents that participate in FL on their behalf. Those agents negotiate and make commitments (i.e., contractual agreements) to dynamically form federations. To perform FL, the framework deploys the needed services dynamically, monitors the training rounds, and calculates agents' trust scores based on the established commitments. ART4FL exploits a blockchain network to maintain the trust scores, and it provides those scores to negotiating agents' during the federations' formation phase.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
National Category
Computer Systems
Identifiers
urn:nbn:se:mau:diva-63749 (URN)10.1109/fmec59375.2023.10306036 (DOI)001103180200036 ()2-s2.0-85179515213 (Scopus ID)979-8-3503-1697-1 (ISBN)979-8-3503-1698-8 (ISBN)
Conference
2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Tartu, Estonia, 18-20 September 2023
Available from: 2023-11-20 Created: 2023-11-20 Last updated: 2024-09-03Bibliographically approved
Alawadi, S., Mera, D., Fernandez-Delgado, M., Alkhabbas, F., Olsson, C. M. & Davidsson, P. (2022). A comparison of machine learning algorithms for forecasting indoor temperature in smart buildings. Energy Systems, Springer Verlag, 13(3), 689-705
Open this publication in new window or tab >>A comparison of machine learning algorithms for forecasting indoor temperature in smart buildings
Show others...
2022 (English)In: Energy Systems, Springer Verlag, ISSN 1868-3967, E-ISSN 1868-3975, Vol. 13, no 3, p. 689-705Article in journal (Refereed) Published
Abstract [en]

The international community has largely recognized that the Earth's climate is changing. Mitigating its global effects requires international actions. The European Union (EU) is leading several initiatives focused on reducing the problems. Specifically, the Climate Action tries to both decrease EU greenhouse gas emissions and improve energy efficiency by reducing the amount of primary energy consumed, and it has pointed to the development of efficient building energy management systems as key. In traditional buildings, households are responsible for continuously monitoring and controlling the installed Heating, Ventilation, and Air Conditioning (HVAC) system. Unnecessary energy consumption might occur due to, for example, forgetting devices turned on, which overwhelms users due to the need to tune the devices manually. Nowadays, smart buildings are automating this process by automatically tuning HVAC systems according to user preferences in order to improve user satisfaction and optimize energy consumption. Towards achieving this goal, in this paper, we compare 36 Machine Learning algorithms that could be used to forecast indoor temperature in a smart building. More specifically, we run experiments using real data to compare their accuracy in terms of R-coefficient and Root Mean Squared Error and their performance in terms of Friedman rank. The results reveal that the ExtraTrees regressor has obtained the highest average accuracy (0.97%) and performance (0,058%) over all horizons.

Place, publisher, year, edition, pages
Springer, 2022
National Category
Energy Systems
Identifiers
urn:nbn:se:mau:diva-13827 (URN)10.1007/s12667-020-00376-x (DOI)000509132000001 ()2-s2.0-85078337875 (Scopus ID)
Available from: 2020-03-24 Created: 2020-03-24 Last updated: 2024-11-19Bibliographically approved
Alkhabbas, F., Alsadi, M., Alawadi, S., Awaysheh, F. M., Kebande, V. R. & Moghaddam, M. T. (2022). ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.. Sensors, 22(18), Article ID 6842.
Open this publication in new window or tab >>ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.
Show others...
2022 (English)In: Sensors, E-ISSN 1424-8220, Vol. 22, no 18, article id 6842Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems' environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems' security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach's feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems' constituents to learn about security threats in their environments collaboratively.

Place, publisher, year, edition, pages
MDPI, 2022
Keywords
Internet of Things, blockchain, multi-agent systems, security, self-adaptive and goal-driven systems, software architecture
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-55176 (URN)10.3390/s22186842 (DOI)000858946100001 ()36146191 (PubMedID)2-s2.0-85138427481 (Scopus ID)
Available from: 2022-10-17 Created: 2022-10-17 Last updated: 2024-09-03Bibliographically approved
Alawadi, S., Kebande, V. R., Dong, Y., Bugeja, J., Persson, J. A. & Olsson, C. M. (2021). A Federated Interactive Learning IoT-Based Health Monitoring Platform. In: New Trends in Database and Information Systems: . Paper presented at ADBIS 2021: New Trends in Database and Information Systems. Tartu, Estonia, August 24-26, 2021. (pp. 235-246). Springer
Open this publication in new window or tab >>A Federated Interactive Learning IoT-Based Health Monitoring Platform
Show others...
2021 (English)In: New Trends in Database and Information Systems, Springer, 2021, p. 235-246Conference paper, Published paper (Refereed)
Abstract [en]

Remote health monitoring is a trend for better health management which necessitates the need for secure monitoring and privacy-preservation of patient data. Moreover, accurate and continuous monitoring of personal health status may require expert validation in an active learning strategy. As a result, this paper proposes a Federated Interactive Learning IoT-based Health Monitoring Platform (FIL-IoT-HMP) which incorporates multi-expert feedback as ‘Human-in-the-loop’ in an active learning strategy in order to improve the clients’ Machine Learning (ML) models. The authors have proposed an architecture and conducted an experiment as a proof of concept. Federated learning approach has been preferred in this context given that it strengthens privacy by allowing the global model to be trained while sensitive data is retained at the local edge nodes. Also, each model’s accuracy is improved while privacy and security of data has been upheld.

Place, publisher, year, edition, pages
Springer, 2021
Series
Communications in Computer and Information Science, ISSN 1865-0929, E-ISSN 1865-0937 ; 1450
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mau:diva-47470 (URN)10.1007/978-3-030-85082-1_21 (DOI)000775759800021 ()2-s2.0-85115134304 (Scopus ID)978-3-030-85081-4 (ISBN)978-3-030-85082-1 (ISBN)
Conference
ADBIS 2021: New Trends in Database and Information Systems. Tartu, Estonia, August 24-26, 2021.
Available from: 2021-12-13 Created: 2021-12-13 Last updated: 2024-09-03Bibliographically approved
Kebande, V. R., Alawadi, S., Awaysheh, F. & Persson, J. A. (2021). Active Machine Learning Adversarial Attack Detection in the User Feedback Process. IEEE Access, 9
Open this publication in new window or tab >>Active Machine Learning Adversarial Attack Detection in the User Feedback Process
2021 (English)In: IEEE Access, E-ISSN 2169-3536, E-ISSN 2169-3536, Vol. 9Article in journal (Refereed) Published
Abstract [en]

Modern Information and Communication Technology (ICT)-based applications utilize currenttechnological advancements for purposes of streaming data, as a way of adapting to the ever-changingtechnological landscape. Such efforts require providing accurate, meaningful, and trustworthy output fromthe streaming sensors particularly during dynamic virtual sensing. However, to ensure that the sensingecosystem is devoid of any sensor threats or active attacks, it is paramount to implement secure real-timestrategies. Fundamentally, real-time detection of adversarial attacks/instances during the User FeedbackProcess (UFP) is the key to forecasting potential attacks in active learning. Also, according to existingliterature, there lacks a comprehensive study that has a focus on adversarial detection from an activemachine learning perspective at the time of writing this paper. Therefore, the authors posit the importance ofdetecting adversarial attacks in active learning strategy. Attack in the context of this paper through a UFPThreat driven model has been presented as any action that exerts an alteration to the learning system ordata. To achieve this, the study employed ambient data collected from a smart environment human activityrecognition from (Continuous Ambient Sensors Dataset, CASA) with fully labeled connections, where weintentionally subject the Dataset to wrong labels as a targeted/manipulative attack (by a malevolent labeler)in the UFP, with an assumption that the user-labels were connected to unique identities. While the dataset’sfocus is to classify tasks and predict activities, our study gives a focus on active adversarial strategies froman information security point of view. Furthermore, the strategies for modeling threats have been presentedusing the Meta Attack Language (MAL) compiler for purposes adversarial detection. The findings fromthe experiments conducted have shown that real-time adversarial identification and profiling during the UFPcould significantly increase the accuracy during the learning process with a high degree of certainty and pavesthe way towards an automated adversarial detection and profiling approaches on the Internet of CognitiveThings (ICoT).

Place, publisher, year, edition, pages
IEEE, 2021
Keywords
Adversarial detection, user-feedback-process, active machine learning, monitoring industrial feedback.
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Science education
Identifiers
urn:nbn:se:mau:diva-41020 (URN)10.1109/ACCESS.2021.3063002 (DOI)000626493900001 ()2-s2.0-85102241032 (Scopus ID)
Available from: 2021-03-05 Created: 2021-03-05 Last updated: 2024-09-03Bibliographically approved
Alkhabbas, F., Alawadi, S., Spalazzese, R. & Davidsson, P. (2020). Activity Recognition and User Preference Learning for Automated Configuration of IoT Environments. In: IoT '20: Proceedings of the 10th International Conference on the Internet of Things. Paper presented at IoT '20: 10th International Conference on the Internet of Things, Malmö Sweden 6-9 October, 2020 (pp. 1-8). New York, United States: ACM Digital Library, Article ID 3.
Open this publication in new window or tab >>Activity Recognition and User Preference Learning for Automated Configuration of IoT Environments
2020 (English)In: IoT '20: Proceedings of the 10th International Conference on the Internet of Things, New York, United States: ACM Digital Library, 2020, p. 1-8, article id 3Conference paper, Published paper (Refereed)
Abstract [en]

Internet of Things (IoT) environments encompass different types of devices and objects that offer a wide range of services. The dynamicity and uncertainty of those environments, including the mobility of users and devices, make it hard to foresee at design time available devices, objects, and services. For the users to benefit from such environments, they should be proposed services that are relevant to the specific context and can be provided by available things. Moreover, environments should be configured automatically based on users' preferences. To address these challenges, we propose an approach that leverages Artificial Intelligence techniques to recognize users' activities and provides relevant services to support users to perform their activities. Moreover, our approach learns users' preferences and configures their environments accordingly by dynamically forming, enacting, and adapting goal-driven IoT systems. In this paper, we present a conceptual model, a multi-tier architecture, and processes of our approach. Moreover, we report about how we validated the feasibility and evaluated the scalability of the approach through a prototype that we developed and used.

Place, publisher, year, edition, pages
New York, United States: ACM Digital Library, 2020
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:mau:diva-36986 (URN)10.1145/3410992.3411003 (DOI)2-s2.0-85123041965 (Scopus ID)978-1-4503-8758-3 (ISBN)
Conference
IoT '20: 10th International Conference on the Internet of Things, Malmö Sweden 6-9 October, 2020
Available from: 2020-11-26 Created: 2020-11-26 Last updated: 2024-02-05Bibliographically approved
Kebande, V. R., Alawadi, S., Bugeja, J., Persson, J. A. & Olsson, C. M. (2020). Leveraging Federated Learning & Blockchain to counter Adversarial Attacks in Incremental Learning. In: IoT '20 Companion: 10th International Conference on the Internet of Things Companion. Paper presented at 10th International Conference on the Internet of Things Companion, October 6-9, 2020, Malmö Sweden (pp. 1-5). ACM Digital Library, Article ID 2.
Open this publication in new window or tab >>Leveraging Federated Learning & Blockchain to counter Adversarial Attacks in Incremental Learning
Show others...
2020 (English)In: IoT '20 Companion: 10th International Conference on the Internet of Things Companion, ACM Digital Library, 2020, p. 1-5, article id 2Conference paper, Published paper (Refereed)
Abstract [en]

Whereas data labelling in IoT applications is costly, it is also time consuming to train a supervised Machine Learning (ML) algorithm. Hence, a human oracle is required to gradually annotate the data patterns at run-time to improve the models’ learning behavior, through an active learning strategy in form of User Feedback Process (UFP). Consequently, it is worth to note that during UFP there may exist malicious content that may subject the learning model to be vulnerable to adversarial attacks, more so, manipulative attacks. We argue in this position paper, that there are instances during incremental learning, where the local data model may present wrong output, if retraining is done using data that has already been subjected to adversarial attack. We propose a Distributed Interactive Secure Federated Learning (DISFL) framework that utilizes UFP in the edge and fog node, that subsequently increases the amount of labelled personal local data for the ML model during incremental training. Furthermore, the DISFL framework addresses data privacy by leveraging federated learning, where only the model's knowledge is moved to a global unit, herein referred to as Collective Intelligence Node (CIN). During incremental learning, this would then allow the creation of an immutable chain of data that has to be trained, which in its entirety is tamper-free while increasing trust between parties. With a degree of certainty, this approach counters adversarial manipulation during incremental learning in active learning context at the same time strengthens data privacy, while reducing the computation costs.

Place, publisher, year, edition, pages
ACM Digital Library, 2020
Keywords
Federated learning, adversarial, blockchain, privacy, incremental training
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-48196 (URN)10.1145/3423423.3423425 (DOI)001062649200002 ()2-s2.0-85117542476 (Scopus ID)9781450388207 (ISBN)
Conference
10th International Conference on the Internet of Things Companion, October 6-9, 2020, Malmö Sweden
Funder
Knowledge Foundation
Available from: 2021-12-15 Created: 2021-12-15 Last updated: 2023-12-13Bibliographically approved
Kebande, V. R., Ikuesan, R., Karie, N., Alawadi, S., Kim-Kwang, R. C. & Al-Dhaqm, A. (2020). Quantifying the need for supervised machine learning in conducting liveforensic analysis of emergent configurations (ECO) in IoT environments. Forensic Science International: Reports, 2, Article ID 100122.
Open this publication in new window or tab >>Quantifying the need for supervised machine learning in conducting liveforensic analysis of emergent configurations (ECO) in IoT environments
Show others...
2020 (English)In: Forensic Science International: Reports, ISSN 2665-9107, Vol. 2, article id 100122Article in journal, Editorial material (Other academic) Published
Abstract [en]

Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise datafrom a broad range of Internet of Things devices, across complex environment(s) to solve different problems. Thispaper surveys existing literature on the potential of using supervised classical machine learning techniques, such asK-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing livedigital forensics for different IoT configurations. There are also a number of challenges associated with the use ofmachine learning techniques, as discussed in this paper.

Place, publisher, year, edition, pages
Elsevier, 2020
Keywords
Supervised machine, Learning, Live forensics, Emergent configurations, IoT
National Category
Engineering and Technology
Identifiers
urn:nbn:se:mau:diva-37145 (URN)10.1016/j.fsir.2020.100122 (DOI)2-s2.0-85099007368 (Scopus ID)
Available from: 2020-12-06 Created: 2020-12-06 Last updated: 2024-06-17Bibliographically approved
Organisations

Search in DiVA

Show all publications