Browsing by Author "Alharbi, Ahmed"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Restricted A Study of the Position Resolution of the Segmented Inverted-coaxial GerMAnium (SIGMA) Detector for Gamma-Ray Tracking and Imaging(University of Liverpool, 2024) Alharbi, Ahmed; Harkness-Brennan, LauraThe SIGMA detector is a novel p-type segmented germanium detector, manufactured specifically for γ-ray tracking and imaging purposes. The detector combines small point contact technology with segmentation of the outer contacts. The small physical size of the point-like contact provides a low capacitance, resulting in low series noise and superior energy resolution which is key to its application in gamma-ray spectroscopy and tracking. Moreover, the segmentation of the outer contacts, in conjunction with Pulse Shape Analysis (PSA) algorithms, provides precise information about the γ-ray interaction positions within the detector. This enables SIGMA to generate data that can be used to track the scattered γ-ray interactions throughout the crystal. The work detailed in this thesis shows the first experimental investigation of the position resolution of this novel detector. Initially, GEANT4 simulations were conducted to assess the individual contributions of energy and position resolution to the γ-ray tracking and imaging capabilities of SIGMA, aiming to predict its performance and highlight areas of focus for further research and development. The experimental signal response of SIGMA to γ-ray irradiation as a function of γ-ray interaction position was characterised using the University of Liverpool scanning system. A detailed simulated signal database was produced and validated against the experimental signals. This validated database of signals as a function of interaction position can then be used as a search space for identifying where γ-rays interact during experiments . The position resolution of single-site interactions within SIGMA, generated by collimated γ-ray beams at known positions across various detector regions was assessed using pulse shape analysis algorithms with a chi-squared minimisation approach to search the experimentally validated database. It was found that the position resolution for radial positions is between 2.7 mmand4.2 mm, around 7◦ for azimuthal positions, and approximately 2.4 mm for the z-depth positions of the detector. This is the first experimental measurement of position resolution within the detector, which is the performance metric that drives its great potential in γ-ray tracking and imaging. The feasibility of using SIGMA for Compton Imaging was subsequently investigated through implementing PSA algorithms for multi-interaction events. Compton imaging was successfully performed with 22Na, 137Cs, and 60Co point sources, emitting γ-rays with energies of 511 keV, 662 keV, and 1175 keV, respectively. At a stand-off distance of 10 cm, the FWHM of the image resolution was found to be of the order ∼100 mm. Further work is recommended to fully realise the imaging potential of the detector.29 0Item Restricted Identity Cloning Detection in Social Sensor-Clouds(Saudi Digital Library, 2023) Alharbi, Ahmed; Dong, Hai; Yi, XunSocial sensing is a paradigm that enables the crowdsourcing of data from humans and devices. This sensed data (e.g., social network posts) can be hosted in social-sensor clouds (i.e., social networks) and delivered as social-sensor cloud services (SocSen services). These services can be identified by their providers' social network accounts. Attackers breach the security of social-sensor clouds by cloning the user profiles of SocSen service providers in order to deceive the users of social-sensor services cloud. The existing research on cloned identity detection still has several major limitations. First, prior studies focused mainly on privacy-sensitive user profile data (e.g., full name, date of birth) and non-privacy-sensitive user profile data (e.g., account description, posts). Privacy-sensitive user profile data cannot be accessed by third-party applications via Application Programming Interfaces (APIs) or other means due to privacy safeguards. Second, current approaches apply simple feature similarity methods or supervised machine learning to detect cloned identities. Simple feature similarity usually involves human-defined metrics to determine the similarities in profile attributes, focusing only on word frequency or the distance between characters. On the other hand, approaches based on supervised machine-learning require labelled data samples for predictive model training. Furthermore, the existing approaches used to detect identity cloning rely on complete SocSen service provider (i.e., social media user) profile data. The performance of these approaches often depends on the availability of comprehensive information in social media profiles. Finally, prior research on cloned identity detection has focused only on detecting similar identities and assumes that all of them are cloned. Thus, to date, no solutions have been proposed for the identification of duplicated accounts. In this thesis, we address the aforementioned limitations and make the following contributions. First, we propose a novel approach for the unsupervised detection of identity cloning in a SocSen service provider. The proposed approach is intended for third-party applications/websites which contain only non-privacy-sensitive user profile data accessed via social media APIs. We devise a multi-view account representation model that generates different views for each account in an account pair comprising three categories of views, namely, 1) post view, 2) network view and 3) profile attribute view. We then adopt Weighted Generalized Canonical Correlation Analysis (wGCCA) to learn a single embedding from the generated multi-view. Finally, we calculate the cosine similarity between the account pair. The evaluation shows that the proposed approach performs well when applied to a real-world Twitter dataset. Second, we propose two prediction models: 1) supervised and 2) weakly-supervised machine learning models. Firstly, both proposed models leverage non-privacy-sensitive user profile data gathered from social networks and a powerful deep learning model to detect cloned identities. The weakly-supervised model is trained using the predicted labels from the supervised model. Using a real-world dataset, we evaluated the performance of our model and compared it with those of state-of-the-art detection techniques and other popular models used to detect identity deception. The results show that our method significantly outperforms these techniques/models in terms of Precision and F1-score. Third, we propose a novel approach for detecting SocSen service provider identity cloning when profile data is incomplete. The proposed approach is especially designed to detect cloned identities based on non-privacy-sensitive profiles. The proposed approach extracts profile and Weighted Generalized Canonical Correlation Analysis (WGCCA)-based features, which can potentially contain missing values. To counter the impact of such missing values, a missing value imputer will next impute the missing values of the aforementioned extracted features. After that, the proposed approach further extracts two categories of augmented features for each account pair identified previously, namely, 1) similarity and 2) differences-based features. Finally, these features are concatenated and fed into a Light Gradient Boosting Machine classifier to detect identity cloning. The experimental results show that the proposed approach outperforms the state-of-the-art approaches and models in terms of Precision, Recall and F1-score. Finally, we design a cryptography-based authentication protocol to determine whether or not a pair of identified similar accounts contain a cloned account. This protocol requests the newer account from an account pair to decrypt two random messages respectively encrypted by the newer and older accounts' public keys for authentication. This is expected to identify the most common noises during cloned account detection, which occur when user creates duplicate accounts on a social media platform. In summary, this thesis makes several contributions to the field of identity cloning in social sensor-clouds. The results show that the proposed approaches significantly outperform the state-of-the-art identity cloning detection techniques.45 0