Ain Shams University, Faculty of Computer and Information ScienceInternational Journal of Intelligent Computing and Information Sciences1687-109X16120160101COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS117915010.21608/ijicis.2016.9150ENMAbduridhaComputer Science Department,Faculty of Computers and Information,
Mansoura University, EgyptATolbaComputer Science Department,Faculty of Computers and Information,
Mansoura University, EgyptMRashadComputer Science Department,Faculty of Computers and Information,
Mansoura University, EgyptJournal Article20180715The Internet of Things (IOT) is a promising area which will boost the world economy. The<br />constituent components of the IOT are smart objects which generate actuation signals or receive<br />sensory signals which are usually noisy, have trend or has small signal-to-noise ratio. Processing these<br />signals for filtering, detrending and enhancing the signal-to-noise ratio is crucial for embedding<br />intelligence in these smart objects. This research discovers the potential of CEEMD in preparing<br />signals for further intelligent applications such as event detection or pattern recognition in smart<br />objects. Algorithms are presented for signal filtering, detrending and event detection based on a<br />combination of both CEEMD, the autocorrelation function and the learning vector quantization<br />classifier.The performance of the proposed algorithms is compared for both CEEMD and the least<br />squares fit approach. The CEEMD has shown promising results.https://ijicis.journals.ekb.eg/article_9150_63fa0b78f4d5ae4f524faec56cbe3e1a.pdfAin Shams University, Faculty of Computer and Information ScienceInternational Journal of Intelligent Computing and Information Sciences1687-109X16120160101USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES19361000510.21608/ijicis.2016.10005ENT. ElarifShabanaComputer Science Dep., Faculty
of Computer and Information Sciences,
Ain Shams University- EgyptBShabanaMisr Higher Institute for
Commerce and Computer
Science, Mansoura-EgyptOAbu -ElNasrComputer Science Dept.,
Faculty of Computer and Information System,
Mansoura University - EgyptBAlnwsahComputer Science Dept.,
Faculty of Computer and Information System,
Mansoura University - EgyptJournal Article20180801<em>Building new cities at the fringes of old ones is a mandatory nowadays to lower the over</em>
<em>increasing population in old cities, and to decrease the heavy load on the infrastructure and services.</em>
<em>The main objective of this work was to evaluate the spatial and temporal changes in land uses within</em>
<em>the studied area by using Remote Sensing (RS) and Geographic Information Systems (GIS) data and</em>
<em>techniques. This is in addition to providing accurate estimations of current land uses to support</em>
<em>decision makers with the right information for further development. Accordingly, Landsat TM images in</em>
<em>1984 and 1999 and Landsat 8 in 2014 were used in this study. Normalized difference vegetation</em>
<em>difference index (NDVI) was used to map agricultural versus non - agricultural lands. Also, the</em>
<em>modified normalized difference water index (MNDWI) was used to map dry lands versus wet lands</em>
<em>(Fish pounds) in the area. The obtained results indicated that agricultural lands were increased by</em>
<em>about 23.1 km</em><em>2 </em><em>from 1984 to 1999 and by about 30.1 km</em><em>2 </em><em>from 1999 to 2014. The total increase in</em>
<em>agricultural lands in 30 years from 1984 to 2014 was about 53.2 km</em><em>2</em><em>. That increase in agricultural</em>
<em>lands was due to land reclamation projects north of Nile-Delta. On the other hand, water features were</em>
<em>increased by about 16.3 km</em><em>2 </em><em>from 1984 to 1999 and by about 23.0 km</em><em>2 </em><em>from 1999 to 2014. The total</em>
<em>increase in Water features from 1984 to 2014 was about 39.3 km</em><em>2</em><em>. That increase in water features was</em>
<em>mainly due to the development of fish pounds. Land use classification derived from the gap-filled</em>
<em>Landsat SCL-off image acquired in 2009 was more accurate when the gap-filling was carried out by</em>
<em>using the Landsat gap-fill plug-in ENVI than using the Matlab. The overall accuracy of the gap-filled</em>
<em>images was not very high, where the gap-filling algorithms could not retrieve the actual pixel values but</em>
<em>interpolate them</em>.https://ijicis.journals.ekb.eg/article_10005_52a4f62dfaff88d1f318ca764b96fded.pdfAin Shams University, Faculty of Computer and Information ScienceInternational Journal of Intelligent Computing and Information Sciences1687-109X16120160101A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS37471000810.21608/ijicis.2016.10008ENGMostafaDepartment of Computer and Information Systems, Sadat Academy for Management SciencesNElkhamesyDepartment of Computer and Information Systems, Sadat Academy for Management SciencesMElbialyDepartment of Computer and Information Systems, Sadat Academy for Management SciencesJournal Article20180801<em>Security is a major concern for the modern age systems, network, and database</em>
<em>administrators. Recently there has been a remarkable interest by both professional and scientific</em>
<em>committee about identifying and detecting tacks while also making all possible actions to enhance</em>
<em>security. Many models and frameworks are proposed in literature, however few have updated list of</em>
<em>actions adapted to types of attacks. This paper presents an effective framework that classifies and</em>
<em>detects the different types of attacks along with their symptoms and features. Such a researcher has</em>
<em>clearly tested and evaluated a common twelve types of attacks the research has covered and analyzed a</em>
<em>survey which spanned over 25 Web developers working with dynamic websites. Numbers of important</em>
<em>observation and results were validated which are centered on the weakness of the applied protection</em>
<em>mechanisms. The research presents a logical framework a long with guideline criteria that enable fast</em>
<em>detection of the common attacks and detective a set of actions that enhance protection and security of</em>
<em>dynamic </em>websites.https://ijicis.journals.ekb.eg/article_10008_e1d7fdb0572529732c2cb62f242941a7.pdfAin Shams University, Faculty of Computer and Information ScienceInternational Journal of Intelligent Computing and Information Sciences1687-109X16120160101A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING59691001010.21608/ijicis.2016.10010ENSEl AshryFaculty of computer, Mansoura University, EgyptMEl-dosukyFaculty of computer, Mansoura University, EgyptMRashadComputer Science Department,Faculty of Computers and Information,
Mansoura University, EgyptHAbdelkaderFaculty of computer, Menofia
University, EgyptJournal Article20180801Data security is always the focus of huge possible cloud clients, also a big obstacle for its<br />extensive applications. Till now there is no proficient mechanism for data security accustomed for the<br />cloud environment, and various service types need different solutions for data protection. The objective<br />of this research is to develop a new data security model for the cloud environment. The proposed model<br />is decomposed of four modes of operations denoting the different ways for providing the service for<br />better user convenience. The four modes are: Scheduling mode, Through-off mode, Virtual machine<br />mode, and Batch mode. Analyzing the proposed model shows the advantages it has over previous<br />models. Based on extensive experiments, the proposed model covers many security cases, and is robust<br />in handling security threats while gaining user convenience.https://ijicis.journals.ekb.eg/article_10010_d925dad9a16ebe6e276db71762c222a6.pdfAin Shams University, Faculty of Computer and Information ScienceInternational Journal of Intelligent Computing and Information Sciences1687-109X16120160101SECURE MOBILE AGENT TRADER SYSTEM71881001110.21608/ijicis.2016.10011ENSKoriemComputer Systems Eng. Department, Faculty of Engineering,Al-Azhar University, Cairo, EgyptRHassaanComputer Systems Eng. Department, Faculty of Engineering,Al-Azhar University, Cairo, EgyptJournal Article20180801<em>Mobile agent systems (MASs)</em>
<em>that travel autonomously through a computer network in order to perform some computation or gather</em>
<em>information on behalf of a human user or an application.</em>
<em>business applications. In most applications, the security of mobile agents is of the utmost importance.</em>
<em>this paper, we propose a MAS</em>
<em>environment.Public key infrastructure is used in</em>
<em>authentication. Policy-based security management has become a growing research area for mobile</em>
<em>agent security. To ensure authorization in</em>
<em>used to grant privileges to agents according to their roles. X.509 certificate is the most widely used data</em>
<em>format for public key certificates.</em>
<em>information in its OU (organization unit) field, to make sure</em>
<em>environment are given access to certain data or resources according to their roles.</em>
<em>may be tampered by malicious agent to misuse its privileges. To ensure agent’s integrity, agent code</em>
<em>encrypted, signedand added in X.509 certificate to be checked before agent execution.</em>
<em>confidentiality, information that needs to be protected from disclosure like agent’s shopping list is</em>
<em>encrypted while travelling through communication channels to preven</em>
<em>eavesdropping.</em>https://ijicis.journals.ekb.eg/article_10011_0dc12e57a086143ed77a96588f133a79.pdfAin Shams University, Faculty of Computer and Information ScienceInternational Journal of Intelligent Computing and Information Sciences1687-109X16120160101VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN89981001210.21608/ijicis.2016.10012ENAIbrahimPhysics department, Faculty of Women for Arts, Sciences
and Education, Ain Shams University-EgyptJournal Article20180801<em>Video steganography is a technique to hide different types of files (secret massages) into a</em>
<em>carrying video file. Video files contain a collection of images (frames) and sounds, so most of</em>
<em>techniques that apply on images and audio files can be applied to video files also. The large amount of</em>
<em>data that can be hidden inside the video and the fact that it is a moving stream of images and sounds</em>
<em>gives the cover video files great advantages. In this paper, we present a proposed video steganography</em>
<em>algorithm in the frequency domain. It was applied to two datasets to study the effect of selecting red,</em>
<em>green and blue band on the quality of stego images. From the results we found, the quality of the stego</em>
<em>images after data embedding into red channel, green channel and blue channel depends on the nature</em>
<em>of the dataset.</em>https://ijicis.journals.ekb.eg/article_10012_2b3fc7ecb4b44856eb646f92cd6dfe75.pdf