Ain Shams University, Faculty of Computer and Information Science
International Journal of Intelligent Computing and Information Sciences
1687-109X
2535-1710
16
1
2016
01
01
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS
1
17
EN
M
Abduridha
Computer Science Department,Faculty of Computers and Information,
Mansoura University, Egypt
muayad.teto88@gmail.com
A
Tolba
Computer Science Department,Faculty of Computers and Information,
Mansoura University, Egypt
ast@astolba.com
M
Rashad
Computer Science Department,Faculty of Computers and Information,
Mansoura University, Egypt
magdi_z2011@yahoo.com
10.21608/ijicis.2016.9150
The Internet of Things (IOT) is a promising area which will boost the world economy. The<br />constituent components of the IOT are smart objects which generate actuation signals or receive<br />sensory signals which are usually noisy, have trend or has small signal-to-noise ratio. Processing these<br />signals for filtering, detrending and enhancing the signal-to-noise ratio is crucial for embedding<br />intelligence in these smart objects. This research discovers the potential of CEEMD in preparing<br />signals for further intelligent applications such as event detection or pattern recognition in smart<br />objects. Algorithms are presented for signal filtering, detrending and event detection based on a<br />combination of both CEEMD, the autocorrelation function and the learning vector quantization<br />classifier.The performance of the proposed algorithms is compared for both CEEMD and the least<br />squares fit approach. The CEEMD has shown promising results.
Internet of Things,Real-time Signal Detrending,Empirical mode decomposition,Complete Ensemble Empirical Mode Decomposition,Signal Denoising,Thresholding,Event Detection,Learning Vector Quantization
https://ijicis.journals.ekb.eg/article_9150.html
https://ijicis.journals.ekb.eg/article_9150_63fa0b78f4d5ae4f524faec56cbe3e1a.pdf
Ain Shams University, Faculty of Computer and Information Science
International Journal of Intelligent Computing and Information Sciences
1687-109X
2535-1710
16
1
2016
01
01
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES
19
36
EN
T. Elarif
Shabana
Computer Science Dep., Faculty
of Computer and Information Sciences,
Ain Shams University- Egypt
taha_elarif@cis.asu.edu.eg
B
Shabana
Misr Higher Institute for
Commerce and Computer
Science, Mansoura-Egypt
bahaashabana@yahoo.com
O
Abu -ElNasr
Computer Science Dept.,
Faculty of Computer and Information System,
Mansoura University - Egypt
abuelnasr@yahoo.com
B
Alnwsah
Computer Science Dept.,
Faculty of Computer and Information System,
Mansoura University - Egypt
batoolalnwsah@gmail.com
10.21608/ijicis.2016.10005
<em>Building new cities at the fringes of old ones is a mandatory nowadays to lower the over</em>
<em>increasing population in old cities, and to decrease the heavy load on the infrastructure and services.</em>
<em>The main objective of this work was to evaluate the spatial and temporal changes in land uses within</em>
<em>the studied area by using Remote Sensing (RS) and Geographic Information Systems (GIS) data and</em>
<em>techniques. This is in addition to providing accurate estimations of current land uses to support</em>
<em>decision makers with the right information for further development. Accordingly, Landsat TM images in</em>
<em>1984 and 1999 and Landsat 8 in 2014 were used in this study. Normalized difference vegetation</em>
<em>difference index (NDVI) was used to map agricultural versus non - agricultural lands. Also, the</em>
<em>modified normalized difference water index (MNDWI) was used to map dry lands versus wet lands</em>
<em>(Fish pounds) in the area. The obtained results indicated that agricultural lands were increased by</em>
<em>about 23.1 km</em><em>2 </em><em>from 1984 to 1999 and by about 30.1 km</em><em>2 </em><em>from 1999 to 2014. The total increase in</em>
<em>agricultural lands in 30 years from 1984 to 2014 was about 53.2 km</em><em>2</em><em>. That increase in agricultural</em>
<em>lands was due to land reclamation projects north of Nile-Delta. On the other hand, water features were</em>
<em>increased by about 16.3 km</em><em>2 </em><em>from 1984 to 1999 and by about 23.0 km</em><em>2 </em><em>from 1999 to 2014. The total</em>
<em>increase in Water features from 1984 to 2014 was about 39.3 km</em><em>2</em><em>. That increase in water features was</em>
<em>mainly due to the development of fish pounds. Land use classification derived from the gap-filled</em>
<em>Landsat SCL-off image acquired in 2009 was more accurate when the gap-filling was carried out by</em>
<em>using the Landsat gap-fill plug-in ENVI than using the Matlab. The overall accuracy of the gap-filled</em>
<em>images was not very high, where the gap-filling algorithms could not retrieve the actual pixel values but</em>
<em>interpolate them</em>.
Land cover,land use,NDVI,MNDWI,Change Detection,Gap-fill,Remote Sensing,GIS
https://ijicis.journals.ekb.eg/article_10005.html
https://ijicis.journals.ekb.eg/article_10005_52a4f62dfaff88d1f318ca764b96fded.pdf
Ain Shams University, Faculty of Computer and Information Science
International Journal of Intelligent Computing and Information Sciences
1687-109X
2535-1710
16
1
2016
01
01
A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS
37
47
EN
G
Mostafa
Department of Computer and Information Systems, Sadat Academy for Management Sciences
ghada5552003@yahoo.com
N
Elkhamesy
Department of Computer and Information Systems, Sadat Academy for Management Sciences
wessasalsol@gmail.com
M
Elbialy
Department of Computer and Information Systems, Sadat Academy for Management Sciences
mohamed@mohamedelbialy.com
10.21608/ijicis.2016.10008
<em>Security is a major concern for the modern age systems, network, and database</em>
<em>administrators. Recently there has been a remarkable interest by both professional and scientific</em>
<em>committee about identifying and detecting tacks while also making all possible actions to enhance</em>
<em>security. Many models and frameworks are proposed in literature, however few have updated list of</em>
<em>actions adapted to types of attacks. This paper presents an effective framework that classifies and</em>
<em>detects the different types of attacks along with their symptoms and features. Such a researcher has</em>
<em>clearly tested and evaluated a common twelve types of attacks the research has covered and analyzed a</em>
<em>survey which spanned over 25 Web developers working with dynamic websites. Numbers of important</em>
<em>observation and results were validated which are centered on the weakness of the applied protection</em>
<em>mechanisms. The research presents a logical framework a long with guideline criteria that enable fast</em>
<em>detection of the common attacks and detective a set of actions that enhance protection and security of</em>
<em>dynamic </em>websites.
Website,Framework,attacks,Hacking,Web server
https://ijicis.journals.ekb.eg/article_10008.html
https://ijicis.journals.ekb.eg/article_10008_e1d7fdb0572529732c2cb62f242941a7.pdf
Ain Shams University, Faculty of Computer and Information Science
International Journal of Intelligent Computing and Information Sciences
1687-109X
2535-1710
16
1
2016
01
01
A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING
59
69
EN
S
El Ashry
Faculty of computer, Mansoura University, Egypt
sobhank_raby@yahoo.com
M
El-dosuky
Faculty of computer, Mansoura University, Egypt
M
Rashad
Computer Science Department,Faculty of Computers and Information,
Mansoura University, Egypt
magdi_z2011@yahoo.com
H
Abdelkader
Faculty of computer, Menofia
University, Egypt
hatem6803@yahoo.com
10.21608/ijicis.2016.10010
Data security is always the focus of huge possible cloud clients, also a big obstacle for its<br />extensive applications. Till now there is no proficient mechanism for data security accustomed for the<br />cloud environment, and various service types need different solutions for data protection. The objective<br />of this research is to develop a new data security model for the cloud environment. The proposed model<br />is decomposed of four modes of operations denoting the different ways for providing the service for<br />better user convenience. The four modes are: Scheduling mode, Through-off mode, Virtual machine<br />mode, and Batch mode. Analyzing the proposed model shows the advantages it has over previous<br />models. Based on extensive experiments, the proposed model covers many security cases, and is robust<br />in handling security threats while gaining user convenience.
Cloud Computing,Data Management,Security Model,Simulation
https://ijicis.journals.ekb.eg/article_10010.html
https://ijicis.journals.ekb.eg/article_10010_d925dad9a16ebe6e276db71762c222a6.pdf
Ain Shams University, Faculty of Computer and Information Science
International Journal of Intelligent Computing and Information Sciences
1687-109X
2535-1710
16
1
2016
01
01
SECURE MOBILE AGENT TRADER SYSTEM
71
88
EN
S
Koriem
Computer Systems Eng. Department, Faculty of Engineering,Al-Azhar University, Cairo, Egypt
samirkoriem@yahoo.com
R
Hassaan
Computer Systems Eng. Department, Faculty of Engineering,Al-Azhar University, Cairo, Egypt
rana_hassaan@live.com
10.21608/ijicis.2016.10011
<em>Mobile agent systems (MASs)</em>
<em>that travel autonomously through a computer network in order to perform some computation or gather</em>
<em>information on behalf of a human user or an application.</em>
<em>business applications. In most applications, the security of mobile agents is of the utmost importance.</em>
<em>this paper, we propose a MAS</em>
<em>environment.Public key infrastructure is used in</em>
<em>authentication. Policy-based security management has become a growing research area for mobile</em>
<em>agent security. To ensure authorization in</em>
<em>used to grant privileges to agents according to their roles. X.509 certificate is the most widely used data</em>
<em>format for public key certificates.</em>
<em>information in its OU (organization unit) field, to make sure</em>
<em>environment are given access to certain data or resources according to their roles.</em>
<em>may be tampered by malicious agent to misuse its privileges. To ensure agent’s integrity, agent code</em>
<em>encrypted, signedand added in X.509 certificate to be checked before agent execution.</em>
<em>confidentiality, information that needs to be protected from disclosure like agent’s shopping list is</em>
<em>encrypted while travelling through communication channels to preven</em>
<em>eavesdropping.</em>
Mobile agent,security,role-based access control,X.509 certificate,public key infrastructure
https://ijicis.journals.ekb.eg/article_10011.html
https://ijicis.journals.ekb.eg/article_10011_0dc12e57a086143ed77a96588f133a79.pdf
Ain Shams University, Faculty of Computer and Information Science
International Journal of Intelligent Computing and Information Sciences
1687-109X
2535-1710
16
1
2016
01
01
VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN
89
98
EN
A
Ibrahim
Physics department, Faculty of Women for Arts, Sciences
and Education, Ain Shams University-Egypt
anwarelbayomi@yahoo.com
10.21608/ijicis.2016.10012
<em>Video steganography is a technique to hide different types of files (secret massages) into a</em>
<em>carrying video file. Video files contain a collection of images (frames) and sounds, so most of</em>
<em>techniques that apply on images and audio files can be applied to video files also. The large amount of</em>
<em>data that can be hidden inside the video and the fact that it is a moving stream of images and sounds</em>
<em>gives the cover video files great advantages. In this paper, we present a proposed video steganography</em>
<em>algorithm in the frequency domain. It was applied to two datasets to study the effect of selecting red,</em>
<em>green and blue band on the quality of stego images. From the results we found, the quality of the stego</em>
<em>images after data embedding into red channel, green channel and blue channel depends on the nature</em>
<em>of the dataset.</em>
Video Steganography,Characterization of Steganography Systems,General Steganography System
https://ijicis.journals.ekb.eg/article_10012.html
https://ijicis.journals.ekb.eg/article_10012_2b3fc7ecb4b44856eb646f92cd6dfe75.pdf