-
Iris based cancelable biometric cryptosystem for secure healthcare smart card Egypt. Inform. J. (IF 3.119) Pub Date : 2021-02-19 Firdous Kausar
Health related information of an individual is very sensitive and demands a high level of security and privacy. Healthcare providers have the responsibility to ensure that patient information is secure and accessible only to authorized users. Healthcare systems are using biometrics since long for authentication and/or access control purposes. Biometrics can also be used for healthcare data security
-
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets Egypt. Inform. J. (IF 3.119) Pub Date : 2021-02-08 Ayat Mahmoud; Ayman El-Kilany; Farid Ali; Sherif Mazen
With the volume of data increasing exponentially, there is a growing interest in helping people to benefit from their data regardless of its poor quality. One of the major data quality problems is the imbalanced distribution of different categories existing in the data. Such problem would affect the performance of any possible of analysis and mining on the data. For instance, data with an imbalanced
-
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020) Egypt. Inform. J. (IF 3.119) Pub Date : 2021-02-04 Safa'a S. Saleh; Tamer F. Mabrouk; Rana A. Tarabishi
Although wireless sensor networks (WSNs) have been utilized for over one decade, it is now heavily used by many modern applications such as medical observance, disaster management and environmental monitoring. This type of network suffers from limited energy and a short lifetime in addition to the low channel bandwidth. Bandwidth represents the major challenges of such systems due to the great impact
-
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking Egypt. Inform. J. (IF 3.119) Pub Date : 2021-01-20 Ahmed M. El-Shamy; Nawal A. El-Fishawy; Gamal Attiya; Mokhtar A. A. Mohamed
Cloud computing applications have grown rapidly in the last decade, where many organizations are migrating their applications to cloud data center as they expected high performance, reliability, and the best quality of service. Data centers deploy a variety of technologies, such as software-defined networks (SDN), to effectively manage their resources. The SDN approach is a highly flexible network
-
Aligning document layouts extracted with different OCR engines with clustering approach Egypt. Inform. J. (IF 3.119) Pub Date : 2020-12-30 S. Tomovic; K. Pavlovic; M. Bajceta
Layout analysis is essential step in information extraction from scanned document images. In this paper we propose an algorithm for aligning layouts generated with different OCR engines. The main requirement is to always generate the same layout for the given document image regardless of OCR engine used for image processing. In that way information extraction from scanned documents, that is heavily
-
Lane prediction optimization in VANET Egypt. Inform. J. (IF 3.119) Pub Date : 2020-12-30 Ghassan Samara
Among the current advanced driver assistance systems, Vehicle-to-Vehicle (V2V) technology has great potential to increase Vehicular Ad Hoc Network (VANET) performance in terms of security, energy efficiency, and comfortable driving. In reality, vehicle drivers regularly change lanes depending on their assumptions regarding visual distances. However, many systems are not quite well-designed, because
-
Efficient privacy-preservation scheme for securing urban P2P VANET networks Egypt. Inform. J. (IF 3.119) Pub Date : 2020-12-26 Bechir Alaya
To meet the performance and security challenges for users who have the same interests in the urban Peer-to-Peer VANET environment (UP2PVANET), the confidentiality & security scheme applied to the urban P2P VANET network (CSP2P) is introduced which helps maintain an effective certification framework. An intelligent cooperative detection system is also proposed, that uses homomorphic encryption to detect
-
Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system Egypt. Inform. J. (IF 3.119) Pub Date : 2020-12-25 Ramaprabha Jayaram; S. Prabakaran
Edge-based privacy preserving cryptosystem is identified as the upcoming amenities of cloud-based secure remote healthcare monitoring systems. Usually, the cloud-based healthcare system will directly collect the remote patient data through a sensor layer and provide the continuous monitoring and diagnosis through various prediction processes made by the decision support system. These sensing and processing
-
Synthetic data with neural machine translation for automatic correction in arabic grammar Egypt. Inform. J. (IF 3.119) Pub Date : 2020-12-24 Aiman Solyman; Wang Zhenyu; Tao Qian; Arafat Abdulgader Mohammed Elhag; Muhammad Toseef; Zeinab Aleibeid
The automatic correction of grammar and spelling errors is important for students, second language learners, and some Natural Language Processing (NLP) tasks such as part of speech and text summarization. Recently, Neural Machine Translation (NMT) has been an out-performing and well-established model in the task of Grammar Error Correction (GEC). Arabic GEC is still growing because of some challenges
-
The impact of using different annotation schemes on named entity recognition Egypt. Inform. J. (IF 3.119) Pub Date : 2020-11-19 Nasser Alshammari; Saad Alanazi
Named entity recognition (NER) is a subfield of information extraction, which aims to detect and classify predefined named entities (e.g., people, locations, organizations, etc.) in a body of text. In the literature, many researchers have studied the application of different machine learning models and features to NER. However, few research efforts have been devoted to studying annotation schemes used
-
Security-aware dynamic VM consolidation Egypt. Inform. J. (IF 3.119) Pub Date : 2020-11-01 Mohamed A. Elshabka; Hanan A. Hassan; Walaa M. Sheta; Hany M. Harb
The explosive growth of cloud usage encourages several challenges, especially high energy consumption of Cloud Data Centers (CDCs), new security risks to Virtual Machines (VMs) resulting from co-residency with other risky VMs on the same Physical Machine (PM), and the Quality of Service (QoS) degradation due to sharing resources. Many recent studies have proposed Dynamic VM Consolidation (DVMC) to
-
Psychological Human Traits Detection based on Universal Language Modeling Egypt. Inform. J. (IF 3.119) Pub Date : 2020-10-31 Kamal El-Demerdash; Reda A. El-Khoribi; Mahmoud A. Ismail Shoman; Sherif Abdou
Personality Traits Detection is one of the important problems as a text analytics task in Natural Language Processing (NLP). Text analytics is the process of finding out insight knowledge over written text. Although most deep learning models give high performance, they often lack interpretability. Computer Vision (CV) has been affected significantly with inductive transfer learning, however training
-
IoT security system with modified Zero Knowledge Proof algorithm for authentication Egypt. Inform. J. (IF 3.119) Pub Date : 2020-10-29 Benfano Soewito; Yonathan Marcellinus
It has been predicted that more devices will be connected to the internet network along with the development of IoT, and that will increase the complexity in the security system. The most important thing in security systems is the process of encryption and authentication. Various encryption techniques are developed to overcome security problems of the data. One of the methods used for authentication
-
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization Egypt. Inform. J. (IF 3.119) Pub Date : 2020-10-24 Idris Rabiu; Naomie Salim; Aminu Da'u; Akram Osman; Maged Nasser
Recommending sustainable products to the target users in a timely manner is the key drive for consumer purchases in online stores and served as the most effective means of user engagement in online services. In recent times, recommender systems are incorporated with different mechanisms, such as sliding windows or fading factors to make them adaptive to dynamic change of user preferences. Those techniques
-
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework Egypt. Inform. J. (IF 3.119) Pub Date : 2020-10-16 Mayada AlMeghari; Sanaa Taha; Hesham Elmahdy; Xuemin(Sherman) Shen
In the virtual world, the authentication process is used to prove the identity for both of the server and the clients. Therefore, the authentication is an urgent issue for sharing data between users in the data warehouse systems. This paper presents the enhancement of Data Warehouse Signature (DWS) framework through proposing a novel authentication and group-key distribution model, based on the modular
-
Evolutionary offloading in an edge environment Egypt. Inform. J. (IF 3.119) Pub Date : 2020-10-09 Samah A. Zakaryia; Safaa A. Ahmed; Mohamed K. Hussein
Due to increasing complexity of mobile applications, and limited computation resources of smart mobile devices, the quality of service requirements of mobile application can be enhanced by offloading the computation tasks of the mobile applications to edge servers, such as cloudlets, which exist at the edge of wireless networks. However, improper placement of mobile tasks on the edge servers may increase
-
HMATC: Hierarchical multi-label Arabic text classification model using machine learning Egypt. Inform. J. (IF 3.119) Pub Date : 2020-09-22 Nawal Aljedani; Reem Alotaibi; Mounira Taileb
Multi-label classification assigns multiple labels to each document concurrently. Many real-world classification problems tend to employ high-dimensional label spaces, which can be naturally structured in a hierarchy. In this type of problem, each instance may belong to multiple labels and labels are organized in a hierarchical structure. It presents a more complex problem than flat classification
-
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis Egypt. Inform. J. (IF 3.119) Pub Date : 2020-09-04 Muhammad Jabir Khan; Poom Kumam; Wejdan Deebani; Wiyada Kumam; Zahir Shah
The concept of picture fuzzy sets (PFS) is a generalization of ordinary fuzzy sets and intuitionistic fuzzy sets, which is characterized by positive membership, neutral membership, and negative membership functions. Keeping in mind the importance of similarity measures and applications in data mining, medical diagnosis, decision making, and pattern recognition, several studies have been proposed in
-
A new evolutionary algorithm: Learner performance based behavior algorithm Egypt. Inform. J. (IF 3.119) Pub Date : 2020-09-01 Chnoor M. Rahman; Tarik A. Rashid
A novel evolutionary algorithm called learner performance based behavior algorithm (LPB) is proposed in this article. The basic inspiration of LPB originates from the process of accepting graduated learners from high school in different departments at university. In addition, the changes those learners should do in their studying behaviors to improve their study level at university. The most important
-
Adopting security maturity model to the organizations’ capability model Egypt. Inform. J. (IF 3.119) Pub Date : 2020-08-31 Osamah M.M. Al-Matari; Iman M.A. Helal; Sherif A. Mazen; Sherif Elhennawy
Each organization faces threats and risks in daily operations. One of the main risks is how to assess the security level to protect from the increasing risks associated with technology evolution. So, organizations can specify the required approaches and skills. In this paper, we propose a security maturity model that classifies the organizations into five levels. Each level determines the technologies
-
Hybridized classification algorithms for data classification applications: A review Egypt. Inform. J. (IF 3.119) Pub Date : 2020-08-20 F. Sherwani; B.S.K.K. Ibrahim; Muhammad Mujtaba Asad
Machine-based classification usually involves some computer programs, known as algorithms, developed using several mathematical formulations to accelerate the automated classification process. Along with the exponential increase in the size and computational complexity of the data today, such optimized, robust, agile and reliable computational algorithms are required which can efficiently carry out
-
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition Egypt. Inform. J. (IF 3.119) Pub Date : 2020-08-13 Elham S. Salama; Reda A. El-Khoribi; Mahmoud E. Shoman; Mohamed A. Wahby Shalaby
Nowadays, human emotion recognition is a mandatory task for many human machine interaction fields. This paper proposes a novel multi-modal human emotion recognition framework. The proposed scheme utilizes first the 3D-Convolutional Neural Network (3D-CNN) deep learning architecture for extracting the spatio-temporal features from the electroencephalogram (EEG) signals, and the video data of human faces
-
Security and privacy of electronic health records: Concerns and challenges Egypt. Inform. J. (IF 3.119) Pub Date : 2020-08-04 Ismail Keshta; Ammar Odeh
Electronic Medical Records (EMRs) can provide many benefits to physicians, patients and healthcare services if they are adopted by healthcare organizations. But concerns about privacy and security that relate to patient information can cause there to be relatively low EMR adoption by a number of health institutions. Safeguarding a huge quantity of health data that is sensitive at separate locations
-
Trajectory control and image encryption using affine transformation of lorenz system Egypt. Inform. J. (IF 3.119) Pub Date : 2020-07-29 Wafaa S. Sayed; Ahmed G. Radwan; Hossam A.H. Fahmy; AbdelLatif Elsedeek
This paper presents a generalization of chaotic systems using two-dimensional affine transformations with six introduced parameters to achieve scaling, reflection, rotation, translation and/or shearing. Hence, the location of the strange attractor in space can be controlled without changing its chaotic dynamics. In addition, the embedded parameters enhance the randomness and sensitivity of the system
-
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression Egypt. Inform. J. (IF 3.119) Pub Date : 2020-07-28 Kerem Gencer; Fatih Başçiftçi
This study presents a new approach for calculations within the Common Vulnerability Scoring System that scoring the effects of vulnerabilities in software on the security status. These calculations is the method that is most commonly used in scoring software vulnerabilities. The present model demonstrates how software security vulnerabilities can be calculated using linguistic terms. Therefore, the
-
A new fusion of mutual information and Otsu multilevel thresholding technique for hyperspectral band selection Egypt. Inform. J. (IF 3.119) Pub Date : 2020-07-16 K. Nandhini; R. Porkodi
Hyperspectral data are a curse with huge dimensionality, high redundancy of spectral information, and are noisy in nature. Hundreds of narrow adjacent bands are present in HS (Hyperspectral) data with high spectral information and it always leads to a computational complexity in space and time. The information theoretic methods are used for hyperspectral band selection to avoid computational complexity
-
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets Egypt. Inform. J. (IF 3.119) Pub Date : 2020-07-03 Renmin Wang; Qingsheng Zhu; Jiangmei Luo; Fan Zhu
Local outlier detection is a hot area and great challenge in data mining, especially for large-scale datasets. On the one hand, traditional algorithms often achieve low-quality detection results and are sensitive to neighborhood size. On the other hand, they are infeasible for large-scale datasets due to at least O(N2) time and space complexity. In light of these, we propose a new local outlier detection
-
A new explicit algorithmic method for generating the prime numbers in order Egypt. Inform. J. (IF 3.119) Pub Date : 2020-06-11 Abd Elhakeem Abd Elnaby; A.H. El-Baz
This paper presents a new method for generating all prime numbers up to a particular number m∈N,m⩾9, by using the set theory. The proposed method is explicit and works oriented in finding the prime numbers in order. Also, we give an efficiently computable explicit formula which exactly determines the number of primes up to a particular number m∈N,m⩾9. For the best of our knowledge, this is the first
-
AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT Egypt. Inform. J. (IF 3.119) Pub Date : 2020-06-06 A.B. Feroz Khan; G. Anandharaj
The extensive growth of the Internet of Things (IoT) devices leads to the evolution of the broad range of smart applications in numerous fields such as smart home, wearable, education, agriculture, health care, transportation and many more. But security for IoT devices is still a challenging issue as many attacks are possible in the environment. Therefore strong security requirements are an important
-
Joint non-negative and fuzzy coding with graph regularization for efficient data clustering Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-30 Yong Peng; Yikai Zhang; Feiwei Qin; Wanzeng Kong
Non-negative matrix factorization (NMF) is an effective model in converting data into non-negative coefficient representation whose discriminative ability is usually enhanced to be used for diverse pattern recognition tasks. In NMF-based clustering, we often need to perform K-means on the learned coefficient as postprocessing step to get the final cluster assignments. This breaks the connection between
-
Internet of things and ransomware: Evolution, mitigation and prevention Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-28 Mamoona Humayun; NZ Jhanjhi; Ahmed Alsayat; Vasaki Ponnusamy
Internet of things architecture is the integration of real-world objects and places with the internet. This booming in technology is bringing ease in our lifestyle and making formerly impossible things possible. Internet of things playing a vital role in bridging this gap easily and rapidly. IoT is changing our lifestyle and the way of working the technologies, by bringing them together at the one
-
Gender identification for Egyptian Arabic dialect in twitter using deep learning models Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-21 Shereen ElSayed; Mona Farouk
Although the number of Arabic language writers in social media is increasing, the research work targeting Author Profiling (AP) is at the initial development phase. This paper investigates Gender Identification (GI) (male or female) of authors posting Egyptian dialect tweets using Neural Networks (NN) models. Various architectures of NN are explored with extensive parameters’ selection such as simple
-
Automatically transforming full length biomedical articles into search queries for retrieving related articles Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-16 Shariq Bashir; Akmal Saeed Khattak; Mohammed Ali Alshara
Searching relevant articles from medical resources is an important search task in clinical decision support system. The technical contents and long length of biomedical articles make this search task more complicated than many other search tasks. Previous research on biomedical information retrieval (IR) is typically based on keyword search. In this paper we propose a new approach. Using our approach
-
A survey on sentiment analysis in Urdu: A resource-poor language Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-15 Asad Khattak; Muhammad Zubair Asghar; Anam Saeed; Ibrahim A. Hameed; Syed Asif Hassan; Shakeel Ahmad
Background/introduction The dawn of the internet opened the doors to the easy and widespread sharing of information on subject matters such as products, services, events and political opinions. While the volume of studies conducted on sentiment analysis is rapidly expanding, these studies mostly address English language concerns. The primary goal of this study is to present state-of-art survey for
-
GDD: Geometrical driven diagnosis based on biomedical data Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-13 Ahmed E. Mohamed; Mona Farouk
Modern medical diagnosis heavily rely on bio-medical and clinical data. Machine learning algorithms have proven effectiveness in mining this data to provide an aid to the physicians in supporting their decisions. In response, machine learning based approaches were developed to address this problem. These approaches vary in terms of effectiveness and computational cost. Attention has been paid towards
-
A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism Egypt. Inform. J. (IF 3.119) Pub Date : 2020-05-13 Nada M. AbdelAzim; Sherif F. Fahmy; Mohammed Ali Sobh; Ayman M. Bahaa Eldin
Software defined networks are an emerging category of networks in which the data plane and control plane are separated. This separation of planes opens the door for designing sophisticated routing algorithms that would overwhelm the computing power of traditional networking nodes. In this paper, we consider the possibility of introducing node trust into the routing problem. There are many ways for
-
A simple Galois Power-of-Two real time embedding scheme for performing Arabic morphology deep learning tasks Egypt. Inform. J. (IF 3.119) Pub Date : 2020-04-21 Mohammed A. ELAffendi; Ibrahim Abuhaimed; Khawla AlRajhi
This paper describes how a simple novel Galois Power-of-Two (GPOW2) real-time embedding scheme is used to improve the performance and accuracy of downstream NLP tasks. GPOW2 computes embeddings live on the fly (real time) in the context of target NLP tasks without the need for tabulated pre-embeddings. One excellent feature of the method is the ability to capture multilevel embeddings in the same pass
-
An improved gaussian mixture hidden conditional random fields model for audio-based emotions classification Egypt. Inform. J. (IF 3.119) Pub Date : 2020-04-15 Muhammad Hameed Siddiqi
The analysis of human emotions plays a significant role in providing sufficient information about patients in monitoring their feelings for better management of their diseases. Audio-based emotions recognition has become a fascinating research interest for such domains during the last decade. Mostly, audio-based emotions systems depend on the recognition stage. The existing model has a common issue
-
An efficient machine-learning model based on data augmentation for pain intensity recognition Egypt. Inform. J. (IF 3.119) Pub Date : 2020-03-24 Ahmad Al-Qerem
Pain is defined as “a distressing experience associated with actual or potential tissue damage with sensory, emotional, cognitive and social components”, knowing the exact level of pain experienced to have a critical impact for caregivers to make diagnosis and make he suitable treatment plan, but the available methods depend entirely on the patient self-report, which increase the difficulties of knowing
-
A predictive machine learning application in agriculture: Cassava disease detection and classification with imbalanced dataset using convolutional neural networks Egypt. Inform. J. (IF 3.119) Pub Date : 2020-03-09 G. Sambasivam; Geoffrey Duncan Opiyo
This work is inspired by Kaggle competition which was part of the Fine-Grained Visual Categorization workshop at CVPR 2019 (Conference on Computer Vision and Pattern Recognition) we participated in. It aimed at detecting cassava diseases using 5 fine-grained cassava leaf disease categories with 10,000, labeled images collected during a regular survey in Uganda. Traditionally, this detection is done
-
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment Egypt. Inform. J. (IF 3.119) Pub Date : 2020-03-09 Shadi Nashwan
The data capturing and access process is an important stage in the big data applications. Most of these applications are exploited the wireless sensor networks (WSNs) to accomplish this process through the sensor nodes that are deployed in unsecure and unattended environments. Therefore, these applications are suffered from numerous security weaknesses, an adversary may exploit such weaknesses to break
-
Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things Egypt. Inform. J. (IF 3.119) Pub Date : 2020-03-09 Dina Tarek; Abderrahim Benslimane; M. Darwish; Amira M. Kotb
Many IoT applications have been developed recently, this leads to increasing the network load. To avoid the lack of spectrum, IoT can use cognitive radio network concept. This paper presents most of the researches addressing channel allocation and packets scheduling, when merging the cognitive radio networks with the IoT technology. Surveying the researches done in this area shows the work done is
-
An intelligent use of stemmer and morphology analysis for Arabic information retrieval Egypt. Inform. J. (IF 3.119) Pub Date : 2020-03-07 Ali Alnaied; Mosa Elbendak; Abdullah Bulbul
Arabic Information Retrieval has gained significant attention due to an increasing usage of Arabic text on the web and social media networks. This paper discusses a new approach for Arabic stem, called Arabic Morphology Information Retrieval (AMIR), to generate/extract stems by applying a set of rules regarding the relationship among Arabic letters to find the root/stem of the respective words used
-
An approach based on the ifcOWL ontology to support indoor navigation Egypt. Inform. J. (IF 3.119) Pub Date : 2020-03-06 Evelio González; José Demetrio Piñeiro; Jonay Toledo; Rafael Arnay; Leopoldo Acosta
This paper presents an indoor navigation support system based on the Building Information Models (BIM) paradigm. Although BIM is initially defined for the Architecture, Engineering and Construction/Facility Management (AEC/FM) industry, the authors believe that it can provide added value in this context. To this end, the authors will focus on the Industry Foundation Classes (IFC) standard for the formal
-
Modeling of the development of the fetus cognitive map from the sensorimotor system Egypt. Inform. J. (IF 3.119) Pub Date : 2020-02-27 Eman Ahmed; Reda A. El Khoribi; Gamal Darwish; Alexandre Muzy; Gilles Bernot
The human cognitive map formation is still an open question. Based on biological facts, the cognitive map origin goes back to the age of the fetus human. In this paper, our aim is to provide a possible answer to that question. Accordingly, we present a theoretical model of the development of the cognitive map of a fetus human using its sensorimotor data. We define positions of the cognitive map as
-
An Improved Task Allocation Strategy in Cloud using Modified K-means Clustering Technique Egypt. Inform. J. (IF 3.119) Pub Date : 2020-02-20 Vrajesh Sharma; Manju Bala
In the present era, cloud computing has earned much popularity, mainly because of its utilities and relevance with the current technological trends. It is an arrangement which is highly customizable and encapsulated for providing better computational services to its clients worldwide. In cloud computing, scheduling plays a pivotal role in the optimal utilization of resources. Prevalent priority based
-
Detecting software performance problems using source code analysis techniques Egypt. Inform. J. (IF 3.119) Pub Date : 2020-02-20 Salma Eid; Soha Makady; Manal Ismail
Software is evolving rapidly. Many software systems release new versions in short iterations. Code changes within such versions may be enhancements, bug fixes, or new features. While preserving some of those changes, the functionality of software may accidentally degrade its performance within a new version when compared to a previous version thus introducing performance regressions. Developers suffer
-
Formal verification for a PMQTT protocol Egypt. Inform. J. (IF 3.119) Pub Date : 2020-02-13 Eman Elemam; Ayman M. Bahaa-Eldin; Nabil H. Shaker; Mohamed Sobh
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research. The Message Queue Telemetry Transport (MQTT) application layer protocol is widely used in IoT networks. Since, MQTT standard has no mandatory requirements regarding the security
-
The impacts of social media on University students in Iraq Egypt. Inform. J. (IF 3.119) Pub Date : 2020-01-08 Abbas Fadhil Aljuboori; Abdulnaser M. Fashakh; Oguz Bayat
The rapid increase in the era of the technological revolution and the Internet, especially the social media, have created a new reality in the daily life of the societies in general and of the university students in particular, so this new reality without any doubt imposes on us the general effects of this increasing use of social media has affected all areas and societies The effects are positive
-
Extractive multi-document text summarization based on graph independent sets Egypt. Inform. J. (IF 3.119) Pub Date : 2020-01-03 Taner Uçkan; Ali Karcı
We propose a novel methodology for extractive, generic summarization of text documents. The Maximum Independent Set, which has not been used previously in any summarization study, has been utilized within the context of this study. In addition, a text processing tool, which we named KUSH, is suggested in order to preserve the semantic cohesion between sentences in the representation stage of introductory
-
Detection outliers on internet of things using big data technology Egypt. Inform. J. (IF 3.119) Pub Date : 2019-12-26 Haitham Ghallab; Hanan Fahmy; Mona Nasr
Internet of Things (IoT) is a fundamental concept of a new technology that will be promising and significant in various fields. IoT is a vision that allows things or objects equipped with sensors, actuators, and processors to talk and communicate with each other over the internet to achieve a meaningful goal. Unfortunately, one of the major challenges that affect IoT is data quality and uncertainty
-
A novel solution for a Wireless Body Sensor Network: Telehealth elderly people monitoring Egypt. Inform. J. (IF 3.119) Pub Date : 2019-12-10 K. Dhakal, Abeer Alsadoon, P.W.C. Prasad, Rasha S. Ali, Linh Pham, Amr Elchouemi
Event-based data transfer through Wireless Body Sensor Networks (WBSN) for monitoring the health of the elderly has so far not been successfully implemented due to limitations arising forms unreliable data, end-to-end delay during data transmission and the high energy consumption by sensors. This paper aims to improve reliability and latency and to reduce energy consumption by sensors during data transmission
-
A novel enhanced hybrid recursive algorithm: Image processing based augmented reality for gallbladder and uterus visualisation Egypt. Inform. J. (IF 3.119) Pub Date : 2019-12-07 T. Singh, Abeer Alsadoon, P.W.C. Prasad, Omar Hisham Alsadoon, Haritha Sallepalli Venkata, Ahmad Alrubaie
Background: Current Augmented Reality systems in liver and bowel surgeries, are not accurate enough to classify the hidden parts such as gallbladder and uterus which are behind the liver and bowel. Therefore, we aimed to improve the visualization accuracy of bowel and liver augmented videos to avoid the unexpected cuttings on the hidden parts. Methodology: The proposed system consists of an Enhanced
-
Extractive Arabic Text Summarization Using Modified PageRank Algorithm Egypt. Inform. J. (IF 3.119) Pub Date : 2019-12-05 Reda Elbarougy, Gamal Behery, Akram El Khatib
This paper proposed an approach for Arabic text summarization. Text summarization is one of the natural language processing's applications which is used for reducing the original text amount and retrieving only the important information from the original text. The Arabic language has a complex morphological structure which makes it very difficult to extract nouns to be used as a feature for summarization
-
Introducing languid particle dynamics to a selection of PSO variants Egypt. Inform. J. (IF 3.119) Pub Date : 2019-11-29 Siniša Družeta, Stefan Ivić, Luka Grbčić, Ivana Lučin
Previous research showed that conditioning a PSO agent’s movement based on its personal fitness improvement enhances the standard PSO method. In this article, Languid Particle Dynamics (LPD) technique is used on five adequate and widely used PSO variants. Five unmodified PSO variants were tested against their LPD-enabled counterparts on three search space dimensionalities (10, 20, and 50 dimensions)
-
A novel crypto technique based ciphertext shifting Egypt. Inform. J. (IF 3.119) Pub Date : 2019-11-20 Farah R. Shareef
One of the significant issues in information security areas is a hidden exchange of data. There are several techniques for this purpose such as cryptography, steganography, etc. Generally, in cryptography, the secret message content is scrambled. In another hand in steganography, the secret message is embedded inside the cover medium. In this paper, a new crypto technique-based ciphertext shifting
-
A robust clustering algorithm using spatial fuzzy C-means for brain MR images Egypt. Inform. J. (IF 3.119) Pub Date : 2019-11-18 Madallah Alruwaili; Muhammad Hameed Siddiqi; Muhammad Arshad Javed
Magnetic Resonance Imaging (MRI) is a medical imaging modality that is commonly employed for the analysis of different diseases. However, these images come with several problems such as noise and other imaging artifacts added during acquisition process. The researchers have actual challenges for segmentation under the consideration of these effects. In medical images, a well-known clustering approach
-
Noise robust Laws’ filters based on fuzzy filters for texture classification Egypt. Inform. J. (IF 3.119) Pub Date : 2019-11-03 Sonali Dash; Manas Ranjan Senapati
Laws’ mask method has achieved wide acceptance in texture analysis, however it is not robust to noise. Fuzzy filters are well known for denoising applications. This work proposes a noise-robust Laws’ mask descriptor by integrating the exiting fuzzy filters with the traditional Laws’ mask for the improvement of texture classification of noisy texture images. Images are corrupted by adding Gaussian noise
-
Employing PCA and t-statistical approach for feature extraction and classification of emotion from multichannel EEG signal Egypt. Inform. J. (IF 3.119) Pub Date : 2019-11-02 Md. Asadur Rahman; Md. Foisal Hossain; Mazhar Hossain; Rasel Ahmmed
To achieve a highly efficient brain-computer interface (BCI) system regarding emotion recognition from electroencephalogram (EEG) signal, the most crucial issues are feature extractions and classifier selection. This work proposes an innovative method that hybridizes the principal component analysis (PCA) and t-statistics for feature extraction. This work contributes to successfully implement spatial
-
NOMA based CR for QAM-64 and QAM-256 Egypt. Inform. J. (IF 3.119) Pub Date : 2019-10-28 Arun Kumar, Mohit Kumar Sharma, Kanchan Sengar, Suraj Kumar
Non-Orthogonal multiple access (NOMA) and Cognitive radio (Cr) are seen as one of the most promising techniques, which improves the utilization of the spectrum in 5G. The expanding number of wireless applications like new gadgets, IOT brought about developing a block in the ISM groups. The FCC requested to permit unlicensed clients to work in the void area without obstruction to an authorized guest
Contents have been reproduced by permission of the publishers.