Magdy Bayoumi

Magdy Bayoumi
University of Louisiana at Lafayette | ULL

About

791
Publications
72,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,609
Citations

Publications

Publications (791)
Preprint
p>Starting with 5G-NR standard and moving towards 6G, the mmW communications technology (in 6 − 300 GHz frequency range) fulfills the demand for high throughput in various parts of the radio access network. The fragile propagation characteristics of mmW signals compels a more meticulous radio network planning, even in the initial phases. Previously...
Preprint
p>Starting with 5G-NR standard and moving towards 6G, the mmW communications technology (in 6 − 300 GHz frequency range) fulfills the demand for high throughput in various parts of the radio access network. The fragile propagation characteristics of mmW signals compels a more meticulous radio network planning, even in the initial phases. Previously...
Article
Internet of Things (IoT) have opened the door to a world of unlimited possibilities for implementations in varied sectors in society, but it also has many challenges. One of those challenges is security and privacy. IoT devices are more susceptible to security threats and attacks. Due to constraints of the IoT devices such as area, power, memory, e...
Preprint
Full-text available
This proposes a novel ensemble deep learning-based model to accurately classify, detect and localize different defect categories for aggressive pitches and thin resists (High NA applications).In particular, we train RetinaNet models using different ResNet, VGGNet architectures as backbone and present the comparison between the accuracies of these m...
Conference Paper
Full-text available
Defect inspection in semiconductor processes has become a challenging task due to continuous shrink of device patterns (pitches less than 32 nm) as we move from node to node. Current state-of-the-art defect detection tools (optical/e-beam) have certain limitations as these tools are driven by some rule-based techniques for defect classification and...
Conference Paper
Full-text available
Physical Unclonable Functions (PUFs) are popular hardware security primitives that offer lightweight authentication for constrained devices. However, lightweight PUF-based authen-tication often limits the number of authentications provided or even throttle the device to prevent adversaries from collecting enough information that could compromise th...
Article
Full-text available
Cloud Technology is adopted to process video streams because of the great features provided to video stream providers such as the high flexibility of using virtual machines and storage servers at low rates. Video stream providers prepare several formats of the same video to satisfy all users’ devices specification. Video streams in the cloud are ei...
Preprint
Full-text available
Cloud Technology is adopted to process video streams because of the great features provided to video stream providers such as the high flexibility of using virtual machines and storage servers at low rates. Video stream providers prepare several formats of the same video to satisfy all users' devices' specifications. Video streams in the cloud are...
Preprint
Full-text available
Physical Unclonable Functions (PUFs) are emerging security primitives that offer a lightweight security alternative for low-power devices. strong PUFs such as the Arbiter PUF (APUF) are most suited for lightweight authentication protocols. However, strong PUFs usually suffer from poor reliability when subjected to varying operating conditions, agin...
Technical Report
Contributions from a workshop organized by The Center for Advanced Mathematics For Energy Research Applications
Patent
Full-text available
The inventive method, Unsupervised Ranking using Magnetic properties and Correlation coefficient ( URMC ) takes attributes of the dataset as inputs and returns a weight for each of the attributes in the dataset as output. URMC clusters the attributes into similar groups and updates the weight of attributes that can be used to rank the objects. The...
Conference Paper
Full-text available
Frequently accessed video streams are pretranscoded into several formats to satisfy the characteristics of all display devices. Storing several video stream formats imposes a high cost on video stream providers using the old classical way. Alternatively, cloud providers offer a high flexibility of using their services and at a low cost relatively....
Preprint
Network security morning (NSM) is essential for any cybersecurity system, where the average cost of a cyberattack is $1.1 million. No matter how much a system is secure, it will eventually fail without proper and continuous monitoring. No wonder that the cybersecurity market is expected to grow up to $170.4 billion in 2022. However, the majority of...
Article
Full-text available
PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that have been presented often lack security features such as mutual authentication or message encry...
Preprint
Full-text available
Frequently accessed video streams are pre-transcoded into several formats to satisfy the characteristics of all display devices. Storing several video stream formats imposes a high cost on video stream providers using the old classical way. Alternatively, cloud providers offer a high flexibility of using their services and at a low cost relatively....
Article
Full-text available
Over the last few decades, electroencephalogram (EEG) has become one of the most vital tools used by physicians to diagnose several neurological disorders of the human brain and, in particular, to detect seizures. Because of its peculiar nature, the consequent impact of epileptic seizures on the quality of life of patients made the precise diagnosi...
Chapter
Video streaming, in various forms of video on demand (VOD), live, and 360 degree streaming, has grown dramatically during the past few years. In comparison to traditional cable broadcasters whose contents can only be watched on TVs, video streaming is ubiquitous and viewers can flexibly watch the video contents on various devices, ranging from smar...
Article
Full-text available
Soil moisture (SM) plays a significant role in determining the probability of flooding in a given area. Currently, SM is most commonly modeled using physically-based numerical hydrologic models. Modeling the natural processes that take place in the soil is difficult and requires assumptions. Besides, hydrologic model runtime is highly impacted by t...
Article
To address power limitation issues in dark silicon era for multi-core systems-on-chip and chip multiprocessors, run time task-resource and voltage co-allocation with reconfigurable network-on-chip (NoC) framework for energy efficiency (higher performance/watt) is proposed in this work. Distributed resource managers strategy dynamically reconfigures...
Article
Full-text available
Network-on-Chip (NoC) is used as the communication network in many applications that use multiple cores or Processing Elements (PEs). Routers play a crucial role as connectors since a faulty router can degrade the NoC’s performance and cause miscommunication between the network’s components. Thus a faulty router may cause the system to fail. To avo...
Article
Full-text available
Cloud computing is relatively a new technological advancement which has speedily become part of the important technological improvements for computer science. Cloud computing as technological advancement has significantly grown in the recent past. It is currently cheaper hence affordable as the cloud platforms stabilize. Most of the businesses and...
Article
Full-text available
This intellectual property addresses a novel unsupervised algorithm to estimate missing values in multi-attribute objects. The impact of missing attribute value can be serious in different applications such as dataset creation and data analysis. It can lead to biased information, biased estimation or projection, weakened statistical power, and decr...
Conference Paper
Full-text available
Generative Adversarial Networks (GANs) are a class of deep neural networks that provide a unique way of modeling and generating data in an unsupervised manner. The literature shows that GANs are currently an important research area, being used in a variety of applications. Our survey paper gives an overview of GANs and how they have progressed to b...
Conference Paper
Full-text available
While Physically Unclonable Functions (PUFs) are finding a foothold in many commercial hardware platforms as an alternative secure key storage primitive. PUFs are yet to be employed as primitives that can offer secure authentication. Strong PUFs, which are required for authentication protocols due to their large challenge-response space, suffer fro...
Conference Paper
Physically Unclonable Functions (PUFs) are an active area of research for the low-cost security in resource-constrained devices. In this paper a comparative analysis on the security, reliability and area of arbiter-based PUFs such as feed-forward, XOR and the combined feed-forward XOR PUFs is conducted. Furthermore, 32-bit and 64-bit variants are c...
Conference Paper
The growth of the Internet of Things (IoT) results in an expanded attack that requires end-to-end security techniques. IoT applications involve in a business-oriented such as insurance and banking, and mission-critical crisis such as e-health and intelligent transportation systems. One of the most protocols commonly used for resource discovery in I...
Article
The Internet of Things (IoT) has become a hot research topic in recent years to extend Internet connectivity to physical devices in our day-to-day activities. The high diversity of IoT objects, their properties, and capabilities pose significant challenges on the realization of open and interoperable IoT platforms. Resource discovery is a key conce...
Conference Paper
Full-text available
Increasing the performance of a Generative Adver-sarial Network (GAN) requires experimentation in choosing the suitable training hyper-parameters of learning rate and batch size. There is no consensus on learning rates or batch sizes in GANs, which makes it a "trial-and-error" process to get acceptable output. Researchers have differing views regar...
Conference Paper
Full-text available
In the Information Age, the majority of data stored and transferred is digital; however, current security systems are not powerful enough to secure this data. With a growing number of attacks on cybersecurity systems, defense mechanisms need to stay updated with the evolving threats. Security and their related attacks are an iterative pair of objec...
Article
Full-text available
It is highly impossible to differentiate between verified and fake media news and updates with modern emerging technology. The creation of deeper fake photos and videos which use artificial intelligence (AI), that shows someone saying and doing things that never did in reality, is one of the recent innovations that contribute to it. Concentrated de...
Conference Paper
With the advancement of advanced node technology beyond sub-10 nm nodes, high-performance computing is facing a great challenge in the form of excessive levels of heat. Against this limitation, we can re-synthesis any complex digital circuits using reversible logic only, known for ideally Zero-heat dissipation. This paper proposes a novel reversibl...
Presentation
Full-text available
CD-SEM images inherently contain a significant level of noise. This is because a limited number of frames are used for averaging, which is critical to ensure throughput and minimize resist shrinkage. This noise level of SEM images may lead to false defect detections and erroneous metrology. Therefore, reducing noise in SEM images is of utmost impor...
Article
Hardware failures are undesired but a common problem in circuits. Such failures are inherently due to the aging of circuitry or variation in circumstances. In critical systems, customers demand the system never to fail. Several self-healing and fault tolerance techniques have been proposed in the literature for recovering a circuitry from a fault....
Preprint
Full-text available
Video stream is converted to several formats to support the user's device, this conversion process is called video transcoding, which imposes high storage and powerful resources. With emerging of cloud technology, video stream companies adopted to process video on the cloud. Generally, many formats of the same video are made (pre-transcoded) and st...
Preprint
Full-text available
Video streaming, in various forms of video on demand (VOD), live, and 360 degree streaming, has grown dramatically during the past few years. In comparison to traditional cable broadcasters whose contents can only be watched on TVs, video streaming is ubiquitous and viewers can flexibly watch the video contents on various devices, ranging from smar...
Conference Paper
Full-text available
The Internet of Things (IoT) is a very new technology that promises to revolutionize modern networks and commercial/ industrial/military operations. To date, there has been no serious and in-depth effort to secure the hardware and data associated with IoT nodes. One of the primary methods of data protection is encryption. Recent advances in encrypt...
Conference Paper
Abstract—Internet of things (IoT) integrates devices, data, and applications by utilizing internet protocols. IoT applications are used for information gathering, sharing, and dissemination of data. As a result, there is a significant increase in the number of installed IoT devices in recent years, as many sectors in society are implementing IoT ap...
Preprint
Generative Adversarial Networks (GANs) are a class of deep neural networks that provide a unique way of modeling and generating data in an unsupervised manner. The literature shows that GANs are currently an important research area, being used in a variety of applications. Our survey paper gives an overview of GANs and how they have progressed to b...
Article
This paper proposes novel methods for making embryonic hardware efficient against faults through self-healing, fault prediction, and fault-prediction assisted self-healing. The proposed self-healing recovers a faulty embryonic cell through innovative usage of healthy cells. Through experimentations, it is observed that self-healing is effective, bu...
Article
Full-text available
Spatiotemporal sequence prediction is an important problem in deep learning. We study next‐frame(s) video prediction using a deep‐learning‐based predictive coding framework that uses convolutional LSTM (convLSTM) modules. We introduce a novel rgcLSTM architecture that requires a significantly lower parameter budget than a comparable convLSTM. By us...
Article
The task of epileptic focus localization receives great attention due to its role in an effective epileptic surgery. The clinicians highly depend on the intracranial EEG data to make a surgical decision related to epileptic subjects suffering from uncontrollable seizures. This surgery usually aims to remove the epileptogenic region which requires p...
Article
In the past few decades, measuring and recording the brain electrical activities using Electroencephalogram (EEG) has become a standout amongst the tools utilized for neurological disorders' diagnosis, especially seizure detection. In this paper, a novel epileptic seizure detection system based on classifying raw EEG signals' recordings, eliminatin...