2024-03-28T22:10:07Z
https://ijicis.journals.ekb.eg/?_action=export&rf=summon&issue=1783
International Journal of Intelligent Computing and Information Sciences
IJICIS
1687-109X
1687-109X
2016
16
1
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS
M
Abduridha
A
Tolba
M
Rashad
The Internet of Things (IOT) is a promising area which will boost the world economy. Theconstituent components of the IOT are smart objects which generate actuation signals or receivesensory signals which are usually noisy, have trend or has small signal-to-noise ratio. Processing thesesignals for filtering, detrending and enhancing the signal-to-noise ratio is crucial for embeddingintelligence in these smart objects. This research discovers the potential of CEEMD in preparingsignals for further intelligent applications such as event detection or pattern recognition in smartobjects. Algorithms are presented for signal filtering, detrending and event detection based on acombination of both CEEMD, the autocorrelation function and the learning vector quantizationclassifier.The performance of the proposed algorithms is compared for both CEEMD and the leastsquares fit approach. The CEEMD has shown promising results.
Internet of Things
Real-time Signal Detrending
Empirical mode decomposition
Complete Ensemble Empirical Mode Decomposition
Signal Denoising
Thresholding
Event Detection
Learning Vector Quantization
2016
01
01
1
17
https://ijicis.journals.ekb.eg/article_9150_63fa0b78f4d5ae4f524faec56cbe3e1a.pdf
International Journal of Intelligent Computing and Information Sciences
IJICIS
1687-109X
1687-109X
2016
16
1
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES
T. Elarif
Shabana
B
Shabana
O
Abu -ElNasr
B
Alnwsah
Building new cities at the fringes of old ones is a mandatory nowadays to lower the over
increasing population in old cities, and to decrease the heavy load on the infrastructure and services.
The main objective of this work was to evaluate the spatial and temporal changes in land uses within
the studied area by using Remote Sensing (RS) and Geographic Information Systems (GIS) data and
techniques. This is in addition to providing accurate estimations of current land uses to support
decision makers with the right information for further development. Accordingly, Landsat TM images in
1984 and 1999 and Landsat 8 in 2014 were used in this study. Normalized difference vegetation
difference index (NDVI) was used to map agricultural versus non - agricultural lands. Also, the
modified normalized difference water index (MNDWI) was used to map dry lands versus wet lands
(Fish pounds) in the area. The obtained results indicated that agricultural lands were increased by
about 23.1 km2 from 1984 to 1999 and by about 30.1 km2 from 1999 to 2014. The total increase in
agricultural lands in 30 years from 1984 to 2014 was about 53.2 km2. That increase in agricultural
lands was due to land reclamation projects north of Nile-Delta. On the other hand, water features were
increased by about 16.3 km2 from 1984 to 1999 and by about 23.0 km2 from 1999 to 2014. The total
increase in Water features from 1984 to 2014 was about 39.3 km2. That increase in water features was
mainly due to the development of fish pounds. Land use classification derived from the gap-filled
Landsat SCL-off image acquired in 2009 was more accurate when the gap-filling was carried out by
using the Landsat gap-fill plug-in ENVI than using the Matlab. The overall accuracy of the gap-filled
images was not very high, where the gap-filling algorithms could not retrieve the actual pixel values but
interpolate them.
Land cover
land use
NDVI
MNDWI
Change Detection
Gap-fill
Remote Sensing
GIS
2016
01
01
19
36
https://ijicis.journals.ekb.eg/article_10005_52a4f62dfaff88d1f318ca764b96fded.pdf
International Journal of Intelligent Computing and Information Sciences
IJICIS
1687-109X
1687-109X
2016
16
1
A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS
G
Mostafa
N
Elkhamesy
M
Elbialy
Security is a major concern for the modern age systems, network, and database
administrators. Recently there has been a remarkable interest by both professional and scientific
committee about identifying and detecting tacks while also making all possible actions to enhance
security. Many models and frameworks are proposed in literature, however few have updated list of
actions adapted to types of attacks. This paper presents an effective framework that classifies and
detects the different types of attacks along with their symptoms and features. Such a researcher has
clearly tested and evaluated a common twelve types of attacks the research has covered and analyzed a
survey which spanned over 25 Web developers working with dynamic websites. Numbers of important
observation and results were validated which are centered on the weakness of the applied protection
mechanisms. The research presents a logical framework a long with guideline criteria that enable fast
detection of the common attacks and detective a set of actions that enhance protection and security of
dynamic websites.
Website
Framework
attacks
Hacking
Web server
2016
01
01
37
47
https://ijicis.journals.ekb.eg/article_10008_e1d7fdb0572529732c2cb62f242941a7.pdf
International Journal of Intelligent Computing and Information Sciences
IJICIS
1687-109X
1687-109X
2016
16
1
A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING
S
El Ashry
M
El-dosuky
M
Rashad
H
Abdelkader
Data security is always the focus of huge possible cloud clients, also a big obstacle for itsextensive applications. Till now there is no proficient mechanism for data security accustomed for thecloud environment, and various service types need different solutions for data protection. The objectiveof this research is to develop a new data security model for the cloud environment. The proposed modelis decomposed of four modes of operations denoting the different ways for providing the service forbetter user convenience. The four modes are: Scheduling mode, Through-off mode, Virtual machinemode, and Batch mode. Analyzing the proposed model shows the advantages it has over previousmodels. Based on extensive experiments, the proposed model covers many security cases, and is robustin handling security threats while gaining user convenience.
Cloud Computing
Data Management
Security Model
Simulation
2016
01
01
59
69
https://ijicis.journals.ekb.eg/article_10010_d925dad9a16ebe6e276db71762c222a6.pdf
International Journal of Intelligent Computing and Information Sciences
IJICIS
1687-109X
1687-109X
2016
16
1
SECURE MOBILE AGENT TRADER SYSTEM
S
Koriem
R
Hassaan
Mobile agent systems (MASs)
that travel autonomously through a computer network in order to perform some computation or gather
information on behalf of a human user or an application.
business applications. In most applications, the security of mobile agents is of the utmost importance.
this paper, we propose a MAS
environment.Public key infrastructure is used in
authentication. Policy-based security management has become a growing research area for mobile
agent security. To ensure authorization in
used to grant privileges to agents according to their roles. X.509 certificate is the most widely used data
format for public key certificates.
information in its OU (organization unit) field, to make sure
environment are given access to certain data or resources according to their roles.
may be tampered by malicious agent to misuse its privileges. To ensure agent’s integrity, agent code
encrypted, signedand added in X.509 certificate to be checked before agent execution.
confidentiality, information that needs to be protected from disclosure like agent’s shopping list is
encrypted while travelling through communication channels to preven
eavesdropping.
Mobile agent
security
role-based access control
X.509 certificate
public key infrastructure
2016
01
01
71
88
https://ijicis.journals.ekb.eg/article_10011_0dc12e57a086143ed77a96588f133a79.pdf
International Journal of Intelligent Computing and Information Sciences
IJICIS
1687-109X
1687-109X
2016
16
1
VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN
A
Ibrahim
Video steganography is a technique to hide different types of files (secret massages) into a
carrying video file. Video files contain a collection of images (frames) and sounds, so most of
techniques that apply on images and audio files can be applied to video files also. The large amount of
data that can be hidden inside the video and the fact that it is a moving stream of images and sounds
gives the cover video files great advantages. In this paper, we present a proposed video steganography
algorithm in the frequency domain. It was applied to two datasets to study the effect of selecting red,
green and blue band on the quality of stego images. From the results we found, the quality of the stego
images after data embedding into red channel, green channel and blue channel depends on the nature
of the dataset.
Video Steganography
Characterization of Steganography Systems
General Steganography System
2016
01
01
89
98
https://ijicis.journals.ekb.eg/article_10012_2b3fc7ecb4b44856eb646f92cd6dfe75.pdf