عادل علي فرج الوحيشي
عضو هيئة تدريس قار
عضو هيئة تدريس قار
المؤهل العلمي: دكتوراه
الدرجة العلمية: أستاذ مشارك
التخصص: اتصالات بيانات - هندسة اتصالات
قسم الهندسة الكهربائية والحاسوب - مدرسة العلوم التطبيقية والهندسية
المنشورات العلمية
Design of Intelligent Chatbot for Stress Management
Conference paperABSTRACT: This paper focuses on using natural language processing (NLP) in chatbots to manage stress in war-affected countries. A Java-based chatbot was designed to alleviate stress using two algorithms: TextRank and Stanford_CoreNLP. The problem was solved by integrating different languages using a plugin. The chatbot was tested with fifteen people and received positive feedback. Modifications were made based on user feedback, with journaling being a winner. However, the chatbot faced limitations like a lack of Arabic language support and voice chat features.
Adel Ali Faraj Eluheshi, Amira Shlebik, (12-2024), Libya: The International Journal of Engineering & Information Technology (IJEIT), 17-27
Alzheimer’s Disease Based on Machine Learning Algorithms and Mind Maps: Review
Journal ArticleAlzheimer's disease (AD) is a complex neurological illness that has several deep reasons. According to recent research, the use of machine learning techniques (ML) on MRI images can assist in identify the brain regions and the connections between them that are implicated in dementia. The study aims to review literature from 2017 to 2023 on the use of machine learning algorithms to identifying and categorize AD. The precision of each machine learning model is assessed, and mind map models are employed to illustrate the study and compare the outcomes.
Adel Ali Faraj Eluheshi, Howayda Abedallah Elmarzaki, (06-2024), Libya: مجلة ليبيا للعلوم التطبيقية والتقنية, 12 (1), 1-11
Autonomous Search and Rescue Drone
Journal ArticleAbstract. One innovative initiative that shows how technology and creativity can save lives in dire circumstances is the creation of a smart autonomous drone system for Search and Rescue Operations in Libya. The Search and Rescue Drone is a ray of hope that is intended to transform rescue operations by offering a quick and effective way to find persons who are in trouble or who may have been lost in Libya's desert or Mediterranean Sea. A Raspberry Pi, a Pixhawk flying controller, the Internet of Things, and a specially created mobile application are the main parts of the study. With the help of the YOLOv4-tiny module and object detection algorithms, the system enables users to operate the drone and quickly and accurately identify those who go missing in challenging environments. By fusing technological innovation with a humanitarian goal, this paper paves the way for future search and rescue operations in Libya and other nations to be safer and more responsive. The work shows how technology can save lives in dire circumstances and serves as an example of how it can benefit humanity at its most vulnerable times.
Adel Ali Faraj Eluheshi, Zahra A. Elashaal1 , Yousef H. Lamin1 , Mohaned K. Elfandi1, (06-2024), Libya: Libyan Journal of Informatics, 1 (1), 1-17
Detection and Prevention of Distributed Denial of Service (DDOS) Attack on Networks Using OpenSource Tools
Journal ArticleABSTRACT: As more due to the obvious quickening pace of the digital transformation revolution, information and cyber security are
becoming major challenges in industries like banking, telecommunications, and energy. As a branch of cyber security,
network security is concerned with organizing and putting into practice safeguards against software and network hacking and illegal access. To guarantee security, the CIA security tried confidentiality, integrity, and availability must exist. Malicious actors frequently exploit distributed denial of service (DDoS) attacks to compromise availability. When it comes to DDoS detection and prevention, open-source software is thought to be the most economical option. The purpose of this study is to investigate the efficacy and potential of open-source DDoS detection and prevention techniques. To ascertain the best open-source solution, how to launch attacks, and how to measure system performance metrics like CPU, RAM usage, packet loss, and delay, an experimental testbed was set up and assessed. Because PfSense firewall includes widely used intrusion detection/prevention systems (IDS, IPS) packages (such as Snort and Suricata), they are deployed to verify the system performance.
Adel Ali Faraj Eluheshi, Zahra Abdalla Elashaal; Sara Noredeen Fshekah, (06-2024), Libya: Journal of Electronic Systems and Programming, 9 (1), 21-41
Optimizing Network Resilience with Segment Routing A Comparative Study of SR TI-LFA and rLFA
Conference paperAbstract: Network operators are confronted with the demanding requirements resulting from the evolution of IP networks. As a result, it has become necessary to provide rigorous Service Level Agreements (SLAs) that are in line with these requirements. However, traditional IP networks lack the necessary flexibility, scalability, and manageability to meet these demands. In order to address these limitations, the segment routing (SR) architecture has been developed. SR is based on source-routing and tunneling paradigms, which enable IP/MPLS and IPV6 networks to operate in a simplified and more scalable manner. The focus of this paper is on network protection (resiliency) using Topology Independent Loop-Free Alternatives Fast Re-Route (TI-LFA FRR) using MPLS as the underlying technology. SR overcomes the limitations of previous network protection mechanisms in terms of coverage and optimal path selection. To show the effectiveness of SR TI-LFA in comparison to its predecessor, Remote Loop-Free Alternate (rLFA), we have implemented various scenarios. These scenarios are designed to highlight the superior capabilities of TI-LFA.
Adel Ali Faraj Eluheshi, Mahmud Mansour; Najia Ben Saud, (05-2024), Libya: IEEE, 1-6
Enhancing Data Center Performance using Virtual Extensible LAN (VXLAN) EmergingTechnology
Journal ArticleAbstract As more and more people turn to the cloud for their personal and professional purposes, cloud computing has become essential for the majority of users. Given the increased demand for cloud virtualization, the datacenter needs to be able to accommodate more virtual machines (VMs) that are housed on its servers. A datacenter employing old technology may accommodate up to 4096 VLANs, which would restrict the number of tenants it could serve. Spanning-Tree Protocol (SPT) is used by VLANs to remove loops, or duplicates, which block half of the routes and waste available bandwidth. The Virtual Extensible LAN (VXLAN), an emerging technology, must be used from there. It permits network segmentation similar to that of regular VLANs without obstructing traffic or reducing scalability. This study outlined both established and novel approaches and then clarified how to use them for data center topology. It also covered the drawbacks of utilizing conventional technologies. The benefits of cutting-edge technology and its superior influence on datacenter bandwidth utilization. To demonstrate how the new technology enhances data center performance, these technologies were finally replicated using the Eve emulator.
Adel Ali Faraj Eluheshi, Zahra Abdalla Elashaal2 ; Asra Abobker Alazragh3, (04-2024), ليبيا: الأكاديمية الليبية, -2 (-6), 1-14