Haitham Mahmoud’s research while affiliated with Birmingham City University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (18)


Vision‐Based UAV Detection and Tracking Using Deep Learning and Kalman Filter
  • Article

February 2025

·

7 Reads

Computational Intelligence

·

·

·

Haitham Mahmoud

The rapid increase in unmanned aerial vehicles (UAVs) usage across various sectors has heightened the need for robust detection and tracking systems due to safety and security concerns. Traditional methods like radar and acoustic sensors face limitations in noisy environments, underscoring the necessity for advanced solutions such as deep learning‐based detection and tracking. Hence, this article proposes a two‐stage platform designed to address these challenges by detecting, classifying, and tracking various consumer‐grade UAVs. The tracking efficacy of the proposed system is assessed using a combination of deep learning and Kalman filter techniques. Specifically, we evaluate models such as YOLOv3, YOLOv4, YOLOv5, and YOLOx to identify the most efficient detector for the initial detection stage. Moreover, we employ both the Kalman filter and the Extended Kalman filter for the tracking stage, enhancing the system's robustness and enabling real‐time tracking capabilities. To train our detector, we construct a dataset comprising approximately 10,000 records that capture the diverse environmental and behavioural conditions experienced by UAVs during their flight. We then present both visual and analytical results to assess and compare the performance of our detector and tracker. Our proposed system effectively mitigates cumulative detection errors across consecutive video frames and enhances the accuracy of the target's bounding boxes.


Structure of the paper
Typical WebRTC Architecture of two web servers handling signalling between browsers using proprietary protocols over HTTP or WebSockets. After signalling, the browsers establish a direct P2P media path through the WebRTC PeerConnection API, with the cloud representing external services like STUN/TURN servers for secure communication
Secure WebRTC Architecture of two browsers connecting to a web server, including a STUN server, via HTTP signalling. Media communication between the browsers is routed through a TURN server to ensure secure and reliable data transmission, particularly in scenarios where direct P2P connections are not feasible due to network constraints
Survey Methodology of the Systematic Literature review by Keele et al. [11] of four phases; selection phase, Identification phase, screening and refinement phase and compilation of results phase
Data Visualisation of the Extracted papers

+3

A systematic review on WebRTC for potential applications and challenges beyond audio video streaming
  • Article
  • Full-text available

November 2024

·

156 Reads

Video conferencing and live streaming are being used in various industries, such as healthcare, gaming, telecommunication, manufacturing and others. As technology progresses, the need for real-time data transmission with minimal latency has increased. Web Real-Time Communication (WebRTC) addresses this need effectively. WebRTC is a technology designed to provide real-time communication through web and mobile browsers. Its low latency and P2P communication capabilities make it a convenient technology for secure, efficient communication in real-time applications. This paper reviews the key features of WebRTC, discusses its strengths and weaknesses and investigates a detailed analysis of 83 existing studies. Moreover, It evaluates all use cases that can be adopted by WebRTC by examining their descriptions, problem statements, and research gaps based on literature to date. Finally, It highlights the open research directions for the emerging technologies and enhancements of WebRTC. to identify their potential applications.

Download


Figure 2. Evaluation of the BER (a-d) and accuracy (e-h) of different approaches of non-ML, ML (LSTM), and hybrid.
Figure 3. Training and validation convergence for both the ML and hybrid models for Alice and Bob. The loss corresponds to the model's error during training, representing the difference between the predicted and actual outcomes.
Summary of simulated physical layer attacks with the implemented approach and their expected impact.
Advanced Security Framework for 6G Networks: Integrating Deep Learning and Physical Layer Security

October 2024

·

86 Reads

·

1 Citation

Network

This paper presents an advanced framework for securing 6G communication by integrating deep learning and physical layer security (PLS). The proposed model incorporates multi-stage detection mechanisms to enhance security against various attacks on the 6G air interface. Deep neural networks and a hybrid model are employed for sequential learning to improve classification accuracy and handle complex data patterns. Additionally, spoofing, jamming, and eavesdropping attacks are simulated to refine detection mechanisms. An anomaly detection system is developed to identify unusual signal patterns indicating potential attacks. The results demonstrate that machine learning (ML) and hybrid models outperform conventional approaches, showing improvements of up to 85% in bit error rate (BER) and 24% in accuracy, especially under attack conditions. This research contributes to the advancement of secure 6G communication systems, offering details on effective defence mechanisms against physical layer attacks.



Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD)

August 2024

·

45 Reads

·

1 Citation

In recent research, there has been a significant focus on establishing robust quantum cryptography using the continuous-variable quantum key distribution (CV-QKD) protocol based on Gaussian modulation of coherent states (GMCS). Unlike more stable fiber channels, one challenge faced in free-space quantum channels is the complex transmittance characterized by varying atmospheric turbulence. This complexity poses difficulties in achieving high transmission rates and long-distance communication. In this article, we thoroughly evaluate the performance of the CV-QKD/GMCS system under the effect of individual attacks, considering homodyne detection with both direct and reverse reconciliation techniques. To address the issue of limited detector efficiency, we incorporate the phase-sensitive amplifier (PSA) as a compensating measure. The results show that the CV-QKD/GMCS system with PSA achieves a longer secure distance and a higher key rate compared to the system without PSA, considering both direct and reverse reconciliation algorithms. With an amplifier gain of 10, the reverse reconciliation algorithm achieves a secure distance of 5 km with a secret key rate of 10−1 bits/pulse. On the other hand, direct reconciliation reaches a secure distance of 2.82 km.





A Systematic Review of Blockchain-Based Privacy-Preserving Reputation Systems for IoT Applications

June 2024

·

26 Reads

Distributed Ledger Technologies Research and Practice

With the growing popularity of the Internet of Things (IoT), billions of devices are anticipated to be deployed in various industries without establishing trust between them. In environments without pre-established trust, reputation systems provide an effective method of assessing the trustworthiness of IoT devices. There has been considerable literature on deploying reputation systems in industries that have not yet established trust among themselves. Therefore, the paper reviews published studies on reputation systems for IoT applications to date, focusing on decentralised systems and decentralised systems using blockchain technology. These studies are evaluated regarding security (including integrity and privacy) and non-security requirements to highlight open research challenges. In alignment with this, an analysis and summary of the existing review studies on reputation systems for particular IoT applications are presented, demonstrating the need for a review article to consider all IoT applications and those that have not been explored. The IoT applications and sub-applications are described, and their problem statement, literature to date, and research gap are comprehensively evaluated. Finally, the open research challenges concerning reputation systems are reviewed and addressed to provide the researcher with a road map of potential research directions.


Citations (8)


... Consequently, BHD implementations for squeezed state characterization typically require a signalto-noise ratio(SNR) exceeding 10 dB while operating effectively within kHz-MHz bandwidth regimes. Conversely, Gaussianmodulated coherent state applications (e.g., CV-QKD [5][6][7][8][9][10]) present distinct requirements. These implementations demand high-speed optical modulation/detection capabilities governed by sampling rates exceeding 100 MS/s and modulation bandwidths over 1 GHz, necessitating bandwidths spanning tens to hundreds of MHz. ...

Reference:

Development_of_a_novel_high-performance_balanced_homodyne_detector
Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD)

... On the other hand, this increased use also carries the risk of causing disruptions to preexisting services, such as satellite communications and conventional wireless networks. Complex interference mitigation measures, such as spectrum sharing and dynamic channel allocation, must be deployed to ensure that Wi-Fi 7 operates at its highest possible level while simultaneously limiting disruptions to other services [28]. It is vital to deploy advanced congestion control technologies such as network slicing and priority-based traffic management to provide stable and high-quality connections in locations that are highly inhabited and have several devices competing for bandwidth. ...

An ML-based Spectrum Sharing Technique for Time-Sensitive Applications in Industrial Scenarios
  • Citing Conference Paper
  • May 2024

... Mahmoud, H., et al. QoS Provisioning in AI-enabled networks has been discussed by [18], which emphasizes managing efficient effort and reliable networking services while considering user demands. The right environment optimizes this dynamic performance by strategically distributing network resources using machine learning and data analytics. ...

QoS Provisioning and Resource Block Management in AI-Enabled Networks
  • Citing Conference Paper
  • April 2024

... As the groundwork for the next-generation sixth-generation (6G) wireless communications is being laid, initiatives such as those by the International Telecommunication Union (ITU) and the 3GPP standards community are driving towards significant enhancements. These include achieving enormous data transfer at terabit rates, implementing AI/ML-driven processes for network function automation, expanding cloud-native operations, and supporting ultra-low-latency tactile applications in a real-time manner within the edge [4,5]. ...

Intelligent Network Optimisation for Beyond 5G Networks Considering Packet Drop Rate
  • Citing Conference Paper
  • March 2024

... When compared with the baseline YOLO models (trained without dataset augmentation), our YOLOv10l-AD exhibits clear superiority over its baseline counterpart, increasing human recall rates from 0.87 to 0.91, as shown in Figure 2. Moreover, when compared to another study that trains YOLOv5l on the non-augmented AFO dataset [12], our YOLOv5l shows superior performance in detecting human objects compared to its baseline version, with recall rates improving from 0.89 to 0.91. One possible reason for this improvement is that the augmented dataset enhances the models' robustness to variations in image properties such as brightness, tint, and contrast, potentially explaining their improved overall performance in tackling unfamiliar conditions. ...

Enhancing Detection of Remotely-Sensed Floating Objects via Data Augmentation for Maritime SAR

Journal of the Indian Society of Remote Sensing

... It contains 49 features extracted using a range of modern tools, such as IXIA PerfectStorm (a traffic generator), Tcpdump, and Argus, simulating nine attack types: Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode, and Worms. By simulating these contemporary attack types using the latest vulnerability data from the CVE website, UNSW-NB15 offers a more relevant and realistic environment for testing IDS systems, especially when compared to older datasets [111][112][113][114][115][116]. CSE-CIC-IDS 2017-2018 Datasets: The CSE-CIC-IDS datasets, developed in collaboration between the Communications Security Establishment (CSE) and the Canadian Institute for Cybersecurity (CIC), represent some of the most comprehensive and up-to-date datasets for network intrusion detection with simulate real-world attack scenarios in a laboratory environment with networks of both attackers and victims. ...

Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis

... This research aims to explore a specific approach in computer vision, focusing on real-time detection of PPE usage in automotive service settings using a YOLOV8, "You Only Look Once" from Ultralytics [1] convolutional neural network model. The YOLOV8 model has demonstrated good results in PPE detection, as shown by Barlybayev et al. [2], where results of pretrained models are compared, highlighting the concern to reduce accidents as demonstrated by Bhana et al. [3], where computer vision is considered an intelligent option to help mitigate accidents caused by inadequate or lack of PPE. Inspired by successful implementations as demonstrated by Ferdous et al. [4], the model will be simplified to facilitate its embedding in a portable platform, a strategy similarly applied by Gallo et al. [5]. ...

Smart Industrial Safety using Computer Vision
  • Citing Conference Paper
  • August 2023

... These algorithms follow a structured process, from data ingestion and real-time processing to aggregation and analysis, delivering real-time insights through dashboards and reports. Real-time aggregation algorithms are pivotal for time-sensitive applications, and their implementation often involves stream processing frameworks and edge computing technologies to enhance performance and reduce latency [74][75][76]. ...

A Framework for Decentralized, Real-Time Reputation Aggregation in IoV
  • Citing Article
  • June 2023

IEEE Internet of Things Magazine