-
Dual subpopulation artificial bee colony algorithm based on individual gradation Egypt. Inform. J. (IF 5.2) Pub Date : 2024-03-06 Zhaolu Guo, Hongjin Li, Kangshun Li
To boost the search performance of Artificial Bee Colony (ABC) algorithm for handling some complicated optimization problems, a dual subpopulation ABC based on individual gradation (DPGABC) is presented. In DPGABC, the whole population is segmented into two subpopulations with different gradations. Then, the subpopulations respectively utilize the strategies with different characteristics as the candidate
-
An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications Egypt. Inform. J. (IF 5.2) Pub Date : 2024-03-01 Hassan Harb, Aline Abboud, Ameer Sardar Kwekha Rashid, Ghina Saad, Abdelhafid Abouaissa, Lhassane Idoughmar, Mouhammad AlAkkoumi
In the last years, the world has witnessed a potential increasing in the patient number resulted from the increasing number of aged persons along with the emergence of new virus and diseases. This imposes a high pressure on hospitals that suffer from a shortage of medical staff, personal equipment and adequate interventions to overcome such a challenge. Particularly, nurse scheduling is becoming a
-
Enhancing DDoS attack detection in IoT using PCA Egypt. Inform. J. (IF 5.2) Pub Date : 2024-02-13 Sanjit Kumar Dash, Sweta Dash, Satyajit Mahapatra, Sachi Nandan Mohanty, M. Ijaz Khan, Mohamed Medani, Sherzod Abdullaev, Manish Gupta
Internet of Things (IoT) security and reliability rely on the capacity to identify distributed denial-of-service (DDoS) assaults in IoT networks. This research presents a comprehensive study on DDoS attack detection using the NSL-KDD dataset. The dataset contains a diverse set of network traffic data. This paper proposes two approaches, one utilizing Principal Component Analysis (PCA) and another without
-
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers Egypt. Inform. J. (IF 5.2) Pub Date : 2024-02-10 Mohammed Es-sabry, Nabil El Akkad, Lahbib Khrissi, Khalid Satori, Walid El-Shafai, Torki Altameem, Rajkumar Singh Rathore
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four matrices within our encryption system, assigning exclusive integers ranging from 0 to 255. Our proposed methodology employs 16 × 16 matrices to represent the four
-
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities Egypt. Inform. J. (IF 5.2) Pub Date : 2024-02-09 Akashdeep Bhardwaj, Salil Bharany, Anas W. Abulfaraj, Ashraf Osman Ibrahim, Wamda Nagmeldin
Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem that enhanced our daily lives but has pushed private data from inside our homes to external public sources. Threats and attacks mounted against IoT deployments have only increased in recent times. There have been several proposals to secure home automation environments, but there is no full protection against Cybersecurity
-
Botnet sequential activity detection with hybrid analysis Egypt. Inform. J. (IF 5.2) Pub Date : 2024-02-08 Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi, Royyana Muslim Ijtihadie
Botnet is one type of malware that infects devices to carry out illegal activities controlled by a botmaster. Many previous studies detected botnets as a single activity while botnet activities were related. This paper focused on detecting host botnets by analyzing the linkages between each activity on a network. The research proposed a novel method combining sequential pattern mining, feature engineering
-
Cyber vulnerabilities detection system in logistics-based IoT data exchange Egypt. Inform. J. (IF 5.2) Pub Date : 2024-02-01 Ahmed Alzahrani, Muhammad Zubair Asghar
Modern-day digitalization has a profound impact on business and society, revolutionizing logistics. Supply chain digitalization improves transparency, speed, and cost-effectiveness, increasingtech adoption—transportationbenefits from IoT-driven shipment tracking and web data storage. However, cyber threats target IoT data by exploiting cyber vulnerabilities. Although ML/DL approaches have showed potential
-
Combining machine learning algorithms for personality trait prediction Egypt. Inform. J. (IF 5.2) Pub Date : 2024-02-01 Jesus Serrano-Guerrero, Bashar Alshouha, Mohammad Bani-Doumi, Francisco Chiclana, Francisco P. Romero, Jose A. Olivas
Personality is a unique trait that allows discriminating between individuals. It can be defined by a set of stable characteristics of an individual that may affect their interactions, relationships, attitudes, behaviors, and even psychological health. Currently, with the advent of social networking sites that provide user-generated text content, personality trait recognition has gained a lot attention
-
Exploring business intelligence applications in the healthcare industry: A comprehensive analysis Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-30 Sivajothi Ramalingam, M. Subramanian, Avula Sreevallabha Reddy, Nainaru Tarakaramu, M. Ijaz Khan, Sherzod Abdullaev, Sami Dhahbi
Business intelligence can play a significant role in improving the healthcare industry. Healthcare organizations generate massive amounts of data, including patient information, financial data, and operational data. The tools can help healthcare organizations to analyze and utilize this data to improve their operations, reduce costs, and provide better patient care. Business intelligence technologies
-
An effective method for global optimization – Improved slime mould algorithm combine multiple strategies Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-31 Wenqing Xiong, Donglin Zhu, Rui Li, Yilin Yao, Changjun Zhou, Shi Cheng
The stochastic search algorithms are an important optimization technique used to solve complex global optimization problems. The Slime Mould Algorithm (SMA) is one of stochastic search algorithm inspired by the observed behaviors and morphological changes in the foraging process of slime moulds. SMA has the advantage of having few parameters and a simple structure, making it applicable to various real-world
-
En-RfRsK: An ensemble machine learning technique for prognostication of diabetes mellitus Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-30 Bhuvaneswari Amma N.G.
In human bodies, diabetes mellitus is a serious illness catalyzed by high glucose levels. In the event that diabetes remains untreated, it can lead to other basic health issues. This study examines different human body attributes in an effort to prognosticate diabetes. An ensemble approach named, En-RfRsK is proposed to predict the risk of diabetes mellitus which is a voting classifier that encompasses
-
Ransomware detection based on machine learning using memory features Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-29 Malak Aljabri, Fahd Alhaidari, Aminah Albuainain, Samiyah Alrashidi, Jana Alansari, Wasmiyah Alqahtani, Jana Alshaya
Ransomware attacks have escalated recently and are affecting essential infrastructure and enterprises across the globe. Unfortunately, ransomware uses sophisticated encryption techniques to encrypt important files on the targeted machine and then demands payment to decrypt the data. Artificial intelligent techniques including machine learning have been increasingly applied in the field of cybersecurity
-
Enhancing enterprises trust mechanism through integrating blockchain technology into e-commerce platform for SMEs Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-25 Sasikumar Asaithambi, Logesh Ravi, Malathi Devarajan, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed
Small and medium enterprises (SMEs) contribute to strengthening the global market by creating new jobs. Interactions among these companies may indeed be facilitated via e-commerce platforms. However, e-commerce activities seem to be a virtual face-to-face transactions, highly digital, and mutable. E-commerce based SMEs are frequently exposed to virtuous risks and competitive intensity. Blockchain is
-
A biometrics-generated private/public key cryptography for a blockchain-based e-voting system Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-25 Jide Kehinde Adeniyi, Sunday Adeola Ajagbe, Emmanuel Abidemi Adeniyi, Pragasen Mudali, Matthew Olusegun Adigun, Tunde Taiwo Adeniyi, Ojo Ajibola
Voting aims to provide the best decision or select the most selected option for the largest group of voters. Malicious parties gaining access, and otherwise tampering with election results, or the votes make this effort counterproductive. To alleviate this, this study examined the introduction of blockchain. The transparent and immutable nature of the blockchain makes this data impossible to alter
-
Road detection by using gradient magnitude image and adaptive thresholding based Watershed Egypt. Inform. J. (IF 5.2) Pub Date : 2024-01-22 Limin Li, Weixing Wang, Amna Khatoon, Mengfei Wang
In last decade, a lot of road detection algorithms are researched in remote sensing and aerial images, but they are not valuable for very dark and vague road images, hence, a new algorithm for road detection in a vaguer image is studied in this paper. It firstly uses a Gaussian filter to enhance the original image; then, an new edge detection algorithm is utilized to result in a gradient magnitude
-
Optimizing flexible job shop scheduling with automated guided vehicles using a multi-strategy-driven genetic algorithm Egypt. Inform. J. (IF 5.2) Pub Date : 2023-12-21 Wenlong Li, Huan Li, Yuting Wang, Yuyan Han
The flexible job scheduling problem with automated guided vehicles (FJSP-AGVs) is a simplified model of some real manufacturing industries. It contains three strongly coupled subproblems: operation sequences assignment, machine selection, and automatic guided vehicle selection, leading to a huge solution space. Its several unresolved challenges, i.e., problem model and algorithmic designing, persist
-
A fast ADMM algorithm for sparse precision matrix estimation using lasso penalized D-trace loss Egypt. Inform. J. (IF 5.2) Pub Date : 2023-12-12 Mingmin Zhu, Jiewei Jiang, Weifeng Gao
Sparse precision matrix estimation, also known as the estimation of the inverse covariance matrix in statistical contexts, represents a critical challenge in numerous multivariate analysis applications. This challenge becomes notably complex when the dimension of the data is far greater than the capacity of samples. To address this issue, we introduce a convex relaxation model that employs the first-order
-
Visible watermarking for 3D models based on 3D Boolean operation Egypt. Inform. J. (IF 5.2) Pub Date : 2023-12-14 An-Bo Li, Hao Chen, Xian-Li Xie
With the continuous expansion of the application field of 3D models and the convenience of model storage, transmission, and replication, the problems of illegal reproduction, illegal modification, and embezzlement faced by 3D models are gradually becoming severe, which has brought substantial economic losses to the producers of 3D models. Therefore, this study aims to develop a visible watermarking
-
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching Egypt. Inform. J. (IF 5.2) Pub Date : 2023-12-08 Yi Teng, Jinbiao Chen, Shiyuan Zhang, Jiahai Wang, Zizhen Zhang
Dynamic Vehicle Routing Problem with Time Windows (DVRPTW) is an extension of the traditional VRPTW by considering dynamic customer characteristics. In this problem, new customers with specific time windows are received dynamically as time progresses and must be incorporated into the evolving schedule. The goal of DVRPTW is to use the minimum number of vehicles to fulfill all the customer demands with
-
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron Egypt. Inform. J. (IF 5.2) Pub Date : 2023-12-08 Moutaz Alazab, Ruba Abu Khurma, Pedro A. Castillo, Bilal Abu-Salih, Alejandro Martín, David Camacho
This paper proposes an Intrusion Detection System (IDS) employing the Harris Hawks Optimization algorithm (HHO) to optimize Multilayer Perceptron learning by optimizing bias and weight parameters. HHO-MLP aims to select optimal parameters in its learning process to minimize intrusion detection errors in networks. HHO-MLP has been implemented using EvoloPy NN framework, an open-source Python tool specialized
-
Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities Egypt. Inform. J. (IF 5.2) Pub Date : 2023-12-08 Tianyong Wu, Cong Luo, Youkou Dong
In the realm of customized manufacturing, production cycles are often compressed to capture market opportunities swiftly. The blanking system stands as the inaugural and pivotal phase in the realm of large equipment customized manufacturing. This study abstracts a novel problem from real-world blanking systems, as the distributed unrelated parallel machine scheduling with heterogeneous factories and
-
A niche-based evolutionary algorithm with dual cooperative archive for solving constrained multi-objective optimization problems Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-28 Fengyu Guo, Hecheng Li
Constrained multi-objective optimization problems (CMOPs) are commonly encountered in engineering practice. The key to effectively solving these problems lies in achieving a timely balance between convergence, diversity, and feasibility during iterations. Furthermore, the appropriate utilization of infeasible solutions is crucial for identifying potential feasible regions. In order to accomplish this
-
A hybridization of granular adaptive tabu search with path relinking for the multi-depot open vehicle routing problem Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-24 Wenhan Shao, Tuanyue Xiao, Zhouxing Su, Junwen Ding, Zhipeng Lü
The multi-depot open vehicle routing problem (MDOVRP) differs from the classical VRP in that there is more than one depot and the vehicle does not need to return to a depot after serving the last customer. For solving this challenging problem, we propose a hybrid metaheuristic algorithm (GATS-PR) which integrates the granular adaptive tabu search with path relinking. The main contributions of this
-
Optimizing microarray cancer gene selection using swarm intelligence: Recent developments and an exploratory study Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-18 Jeremiah Isuwa, Mohammed Abdullahi, Yusuf Sahabi Ali, Ibrahim Hayatu Hassan, Jesse Romeo Buba, Ibrahim Aliyu, Jinsul Kim, Olaide Nathaniel Oyelade
Microarray data represents a valuable tool for the identification of biomarkers associated with diseases and other biological conditions. Genes, in particular, are a type of biomarker that holds great importance for the identification and understanding of various types of tumors, including brain, lung, and breast cancers. However, a significant portion of these cancer genes are not directly associated
-
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-21 Zhenyu Shi, Tianhao Zhao, Qi Li, Zhixia Zhang, Zhihua Cui
In edge computing (EC), when the edge server (ES) is processing tasks delivered by the mobile devices (MDs), the MDs move outside the coverage of the ES, where task migration is required to ensure service continuity. Most current research on task migration ignores inter-task dependencies and uncertain computing environments, and it focuses mainly on migration scenarios where MDs have a one-to-one or
-
Self-ChakmaNet: A deep learning framework for indigenous language learning using handwritten characters Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-22 Kanchon Kanti Podder, Ludmila Emdad Khan, Jyoti Chakma, Muhammad E.H. Chowdhury, Proma Dutta, Khan Md Anwarus Salam, Amith Khandakar, Mohamed Arselene Ayari, Bikash Kumar Bhawmick, S M Arafin Islam, Serkan Kiranyaz
According to UNESCO's Atlas of the World's Languages in Danger, 40% of the languages today are counted as endangered in the future. Indigenous languages are endangered because of the less availability of interactive learning mediums for those languages. Thus this paper proposes an interactive deep learning method for Handwritten Character Recognition of the indigenous language “Chakma.” The method
-
A many objective commercial recommendation algorithm via Game-Based core node extraction Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-18 Yifei Sun, Yifei Cao, Shi Cheng, Jie Yang, Wenya Shi, Ao Zhang, Jiale Ju
The development of the recommendation system (RS) has been focused on improving the accuracy of algorithms. As the number of new users grows, RS suffers from the cold start problem, data sparsity and long-tail problem. In this paper, we proposed a many objective commercial recommendation algorithm that extracts the core node through the pay-off function of game theory and makes it guide the evolutionary
-
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-16 Yirong Qiu, Lianghong Wu, Cili Zuo, Rui Jia, Hongqiang Zhang
Integrating solar energy into the combined energy supply of surface water source heat pump systems is expected to reduce the electricity consumption and carbon emissions. In this paper, a solar-surface water source heat pump system model is established to maximize system performance and save economic cost. In order to find the optimal operation scheme, an improved arithmetic optimization algorithm
-
Multi-fuzzy clustering validity index ensemble: A Dempster-Shafer theory-based parallel and series fusion Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-11 Hong-Yu Wang, Jie-Sheng Wang, Guan Wang
Clustering validity evaluation is a key part in clustering process. To adapt the complex data structure, the traditional fuzzy clustering validity index (FCVI) is designed more complex. The weighted combined validity evaluation method (WCVEM) is simple in structure but difficult in weight selection. Therefore, this paper proposed an ensemble method based on multi-fuzzy clustering algorithms and multi-FCVI
-
Knowledge graph completion method based on hyperbolic representation learning and contrastive learning Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-04 Xiaodong Zhang, Meng Wang, Xiuwen Zhong, Feixu An
Knowledge graph completion employs existing triples to deduce missing data, thereby enriching and enhancing graph completeness. Recent research has revealed that using hyperbolic representation learning in knowledge graph completion yields superior expressive and generalization capabilities. However, the long-tail problem and the presence of hyperbolic metrics make it challenging to effectively learn
-
Adaptive batch mode active learning with deep similarity Egypt. Inform. J. (IF 5.2) Pub Date : 2023-11-04 Kaiyuan Zhang, Buyue Qian, Jishang Wei, Changchang Yin, Shilei Cao, Xiaoyu Li, Yanjun Cao, Qinghua Zheng
Active learning is usually used in scenarios where few labels are available and manual labeling is expensive. To improve model performance, it is necessary to find the most valuable instance among all instances and label it to maximize the benefits of labeling. In practical scenarios, it is often more efficient to query a group of instances instead of a individual instance during each iteration. To
-
Forensic analysis and security assessment of IoT camera firmware for smart homes Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-20 Akashdeep Bhardwaj, Keshav Kaushik, Salil Bharany, SeongKi Kim
Ease of flexibility, convenience, and smartness have made the Internet of Things (IoT) the industry, and user favorite device has recently piqued the industry's interest. With the widespread use of this technology, an unprecedented number of IoT endpoints, including devices in our homes, are now connected to external networks. Firmware of this type is typically heterogeneous and closed source. At the
-
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-20 Selvarajan Shitharth, Hariprasath Manoharan, Achyut Shankar, Rakan A. Alsowail, Saravanan Pandiaraj, Seyyed Ahmad Edalatpanah, Wattana Viriyasitavat
The Internet of Things (IoT) technology in various applications used in data processing systems requires high security because more data must be saved in cloud monitoring systems. Even though numerous procedures are in place to increase the security and dependability of data in IoT applications, the majority of outside users can decode any transferred data at any time. Therefore, it is essential to
-
Modeling of blockchain with encryption based secure education record management system Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-16 Awatef Salem Balobaid, Yasamin Hamza Alagrash, Ali Hussein Fadel, Jamal N. Hasoon
Blockchain technology can be employed in the education sector by building a decentralized system to store and share student records. The records can be encrypted to guarantee their confidentiality and security. With a blockchain-based system, student records can be saved in blocks that are linked and secured via cryptography. The records are decentralized and not controlled by any single entity, making
-
Two different parallel approaches for a hybrid fractional order Coronavirus model Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-12 N.H. Sweilam, S. Ahmed, Monika Heiner
In this paper, two different parallel approaches for a hybrid fractional order Coronavirus (2019-nCov) mathematical model are presented. Both parallel approaches are implemented using Julia high level language. Parallel algorithm implementations are developed for the HPC cluster using Message Passing Interface (MPI) technology and general-purpose computing on GPUs (GPGPU) using Compute Unified Device
-
Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-15 Farhan Masud, Gaddafi Abdul-Salaam, Muhammad Anwar, Abdelzahir Abdelmaboud, Muhammad Sheraz Arshad Malik, Hadhrami Bin Ab Ghani
Wireless Body Area Networks (WBANs) healthcare application is a group of heterogeneous-natured Bio-Medical Sensor Nodes (BMSNs) used to sense and monitor a patient’s vital signs, in the long run, under natural physiological conditions, without affecting the regular activities. Heterogeneous-natured BMSNs demand prioritized channel access during contention access phases to transmit data or allocate
-
Solving the vehicle routing problem with time windows using modified football game algorithm Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-10 Zakir Hussain Ahmed, Fateme Maleki, Majid Yousefikhoshbakht, Habibollah Haron
The vehicle routing problem with time windows (VRPTW) is a famous problem in logistics and transportation that has many applications in real life. The objective of the problem is to find the minimum distance covered by a set of vehicles that set to start together from the warehouse and visit some prefixed customers within certain time frames. In this paper, an efficient optimization algorithm, called
-
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-10 Ghaida Muttashar Abdulsahib, Dhana Sekaran Selvaraj, A. Manikandan, SatheeshKumar Palanisamy, Mueen Uddin, Osamah Ibrahim Khalaf, Maha Abdelhaq, Raed Alsaqour
The radio frequency spectrum, which has been steadily getting smaller, is under pressure from growing cellular data traffic. A more dependable communication channel is required. To setup the communication medium, VLC uses LED illumination. In order to increase network throughput, the goal of this study is to analyze and model signal conditioning techniques in the visible spectrum. VLC technology offers
-
Deep Learning Approach for Age-related Macular Degeneration Detection Using Retinal Images: Efficacy Evaluation of Different Deep Learning Models Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-04 Ngoc Thien Le, Thanh Le Truong, Pear Ferreira Pongsachareonnont, Disorn Suwajanakorn, Apivat Mavichak, Rath Itthipanichpong, Widhyakorn Asdornwised, Surachai Chaitusaney, Watit Benjapolakul
Age-related macular degeneration (AMD) is a typical fundus disease that affects the central vision of elderly people. It causes difficulties in everyday activities such as reading and recognizing faces. AMD can progress slowly or rapidly, and it leads to severe vision loss if left untreated. Therefore, early detection and diagnosis of AMD are crucial to prevent or delay vision impairment in the elderly
-
Decomposition-based interval multi-objective evolutionary algorithm with adaptive adjustment of weight vectors and neighborhoods Egypt. Inform. J. (IF 5.2) Pub Date : 2023-10-03 Yaqing Jin, Zhixia Zhang, Liping Xie, Zhihua Cui
Interval multi-objective optimization problems (IMOPs) are one of the most critical optimization problems in practical applications. However, compared to deterministic multi-objective optimization problems (MOPs), there are few researchs addressing IMOP. In addition, the uncertainty contained in the problem makes the distribution of the population more challenging. Therefore, this paper proposed a
-
REcaNet: Residual neural networks with initialized weights and attention mechanism for image propagating in multimode optical fiber restoration Egypt. Inform. J. (IF 5.2) Pub Date : 2023-09-28 Weiyi Zhang, Sikai Wang, Haoyu Liu, Chengyu Hu, Yijun Zheng, Xuesong Yan
Training a neural network to reconstruct images from time-series waveforms obtained from fiber optic probes not only yields high-quality, content-aware images but can also acquire different types of images from lower quality training images. Image reconstruction, as an inverse problem, involves using collected signals and system models to retrieve desired images, encountering mathematical challenges
-
-
Diagnosis of patellofemoral osteoarthritis using enhanced sequential deep learning techniques Egypt. Inform. J. (IF 5.2) Pub Date : 2023-08-10 Mai Ramadan Ibraheem, Saleh Naif Almuayqil, A.A. Abd El-Aziz, Medhat A. Tawfeek, Fatma M. Talaat
The surface electromyography (sEMG) signal is a complex interference pattern resulting from the electrical activity of contracting muscles, which directly correlates with muscle activity and exercise level. Patellofemoral osteoarthritis (PF OA) refers to the softening and destruction of the articular cartilage of the knee cap, which is important to diagnose in the early phase. The aim of this study
-
Reliable prediction of software defects using Shapley interpretable machine learning models Egypt. Inform. J. (IF 5.2) Pub Date : 2023-07-31 Yazan Al-Smadi, Mohammed Eshtay, Ahmad Al-Qerem, Shadi Nashwan, Osama Ouda, A.A. Abd El-Aziz
Predicting defect-prone software components can play a significant role in allocating relevant testing resources to fault-prone modules and hence increasing the business value of software projects. Most of the current software defect prediction studies utilize traditional supervised machine learning algorithms to predict defects in software applications. The software datasets utilized in such studies
-
AI-Driven livestock identification and insurance management system Egypt. Inform. J. (IF 5.2) Pub Date : 2023-07-16
Cattle identification is pivotal for many reasons. Animal health management, traceability, bread classification, and verification of insurance claims are largely depended on the accurate identification of the animals. Conventionally, animals have been identified by various means such as ear tags, tattoos, rumen implants, and hot brands. Being non-scientific approaches, these controls can be easily
-
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G Egypt. Inform. J. (IF 5.2) Pub Date : 2023-07-13
In recent years, heterogeneous networks (HetNets) have drawn a lot of attention to connecting devices that will enable everything to become smart, efficient, and fast. These networks are made up of many cell types, including macro, micro, pico, and femto that are added to suit customer demand. HetNets requires sophisticated mobility management to handle a variety of inter-frequency technologies. Mobility
-
Many-objective evolutionary algorithm based on three-way decision Egypt. Inform. J. (IF 5.2) Pub Date : 2023-06-30 Zhihua Cui, Bingting Li, Zhuoxuan Lan, Yubin Xu
In recent years, many-objective optimization problems have been widely used. however, with the increase of the number of objectives, the difficulty of solving increases exponentially, and the imbalance between convergence and diversity becomes more serious. In view of the above problems, this paper combines the idea of three-way decision, redesigns the environment selection strategy, and proposes a
-
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method Egypt. Inform. J. (IF 5.2) Pub Date : 2023-06-07 Imane Aly Saroit, Dina Tarek
Cloud Computing can be defined as enabling computing resources to whoever want remotely upon demand. This necessarily requires using virtualization. A virtual machine (VM) is an emulation of a computer that runs in virtualization software. Tasks coming from different users are passed to the virtual machines to be processed. This paper studies the load balancing problem among various VMs; to ensure
-
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image Egypt. Inform. J. (IF 5.2) Pub Date : 2023-06-07 Mahmoud I. Moussa, Eman I. Abd El-Latif, Ahmed H. Abu El-Atta
In this paper, multidimensional chaos systems called a trilinear chaotic system for encryption the color image is used. Combining the multi-dimensional chaotic system with encryption algorithms improves the security. The trilinear system is built from logistic and cubic maps and generates six completely random bijections T1x,T2x,T2y,T3x,T3y, and T3z. The map T1x randomly shuffles the image pixels,
-
Toward secret data location via fuzzy logic and convolutional neural network Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-30 Ntivuguruzwa Jean De La Croix, Tohari Ahmad
Locating hidden data in digital images, otherwise called steganalysis, is a process of identifying the existence of secret messages within digital images. Steganalysis is used to manage digital data transmission by detecting the possible hidden information that can be used to violate the network policy; hence, it helps the development of policies and regulations aimed at strong protection from cyber
-
An optimal defect recognition security-based terahertz low resolution image system using deep learning network Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-29 Samuel Akwasi Danso, Shang Liping, Deng Hu, Samuel Afoakwa, Eugene Louis Badzongoly, Justice Odoom, Owais Muhammad, Muhammad Umer Mushtaq, Abdul Qayoom, Wenqing Zhou
The physics of Terahertz (THz) technology is the electromagnetic (EM) spectrum band between the infrared and the microwave band with frequencies of about 0.1 to 30 THz. THz signals have gained adoption in medicine, telecommunications, security monitoring and imaging. THz imaging technology has the advantages of rapid imaging, strong penetration, and harmless to the human body hence widely used in a
-
Minimizing tardiness and makespan for distributed heterogeneous unrelated parallel machine scheduling by knowledge and Pareto-based memetic algorithm Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-29 Hua Wang, Rui Li, Wenyin Gong
This work aims to deal with the distributed heterogeneous unrelated parallel machine scheduling problem (DHUPMSP) with minimizing total tardiness (TDD) and makespan. To solve this complex combinatorial optimization problem, this work proposed a knowledge and Pareto-based memetic algorithm (KPMA) which contains the following features: 1) four heuristic rules are designed including the shortest processing
-
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-18 Ahmed Abbas Jasim Al-Hchaimi, Nasri Bin Sulaiman, Mohd Amrallah Bin Mustafa, Mohd Nazim Bin Mohtar, Siti Lailatul Binti Mohd Hassan, Yousif Raad Muhsen
Context Timing side-channel attack countermeasure techniques (TSCA-CTs) evaluation is a multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform architectures, performance, and design overhead. Therefore, the Fermatean by fuzzy decision opinion score method (F-FDOSM) for prioritizing the powerful countermeasure technique against timing side-channel attack is the best
-
Detecting Arabic sexual harassment using bidirectional long-short-term memory and a temporal convolutional network Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-18 Noor Amer Hamzah, Dr. Ban N. Dhannoon
Due to advances in technology, social media has become the most popular medium for spreading news. Many messages are published on social media sites such as Facebook, Twitter, Instagram, etc. Social media platforms also provide opportunities to express opinions and social phenomena such as hate, offensive language, racism, sexual content, and all forms of verbal violence, which have amazingly increased
-
Click fraud detection for online advertising using machine learning Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-15 Malak Aljabri, Rami Mustafa A. Mohammad
Advertising corporations have moved their focus to online and in-App advertisements in response to the expansion of digital technologies and social media. Online advertising represents the primary revenue source for advertising networks that serve as the middlemen between advertisers and advertisement publishers. The advertising networks pay the publisher of the advertisement based on the number of
-
A genomic rule-based KNN model for fast flux botnet detection Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-13 Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Matthew O. Adigun, Sunday Adeola Ajagbe
Fast Flux Botnet (FFB) is an advance method developed by cyber criminals to perpetrate distributed malicious attacks. The major problems of existing FFB detection systems are the vulnerability to evasion mechanisms, long detection time, and high dimensionality of the feature set. In this study, an improved FFB detection architecture called Bot-FFX was developed to address some of these problems. The
-
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-13 Safa'a S. Saleh, Iman Alansari, Mounira Kezadri Hamiaz, Waleed Ead, Rana A. Tarabishi, Hatem Khater
Recently, the Internet of Things (IoT) has played key roles in every aspect of daily routine tasks. IoT applications suffer from higher latency and limited network bandwidth in the internet core. However, due to bandwidth and resource constraints, the resultant massive data traffic triggers storage overhead, high latency, and network bottleneck problems. Therefore, cloud computing and fog computing
-
Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game Egypt. Inform. J. (IF 5.2) Pub Date : 2023-05-12 Wei Gao, Lin Li, Yingchun Xue, Yan Li, Jinlong Zhang
Under Metaverse, security management of communication networks in digital cultural consumption has attracted more and more attention. As we know, security risks of communication networks caused by non-human factors are becoming weaker and weaker due to technology optimization. Meanwhile, players play significant and increasing role in communication networks. Taking mobile games as an example, this
-
Detecting suicidality on social media: Machine learning at rescue Egypt. Inform. J. (IF 5.2) Pub Date : 2023-04-19 Syed Tanzeel Rabani, Akib Mohi Ud Din Khanday, Qamar Rayees Khan, Umar Ayoub Hajam, Ali Shariq Imran, Zenun Kastrati
The rise in technological advancements and Social Networking Sites (SNS) made people more engaged in their virtual lives. Research has revealed that people feel more comfortable posting their feelings, including suicidal thoughts, on SNS than discussing them through face-to-face settings due to the social stigma associated with mental health. This research study aims to develop a multi-class machine
-
Energy-aware intelligent scheduling for deadline-constrained workflows in sustainable cloud computing Egypt. Inform. J. (IF 5.2) Pub Date : 2023-04-18 Min Cao, Yaoyu Li, Xupeng Wen, Yue Zhao, Jianghan Zhu
It is challenging to handle the non-linear power consumption model, complex workflow structures, and diverse user-defined deadlines for energy-efficient workflow scheduling in sustainable cloud computing. Although metaheuristics are very attractive to solve this problem, most of the existing work regards the problem as a black-box and ignores the use of domain knowledge. To make up for their shortcomings