Shawkat Guirguis | Alexandria University (original) (raw)
Papers by Shawkat Guirguis
International Journal of Computational Intelligence Systems
The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by en... more The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread adoption of IoT has also brought forth significant security challenges for manufacturers and consumers alike. Detecting network intrusions in IoT networks using machine learning techniques shows promising potential. However, selecting an appropriate machine learning algorithm for intrusion detection poses a considerable challenge. Improper algorithm selection can lead to reduced detection accuracy, increased risk of network infection, and compromised network security. This article provides a comparative evaluation to six state-of-the-art boosting-based algorithms for detecting intrusions in IoT. The methodology overview involves benchmarking the performance of the selected boosting-based algorithms in multi-class classification. The evaluation includes a comprehensive classification performance analysis includes accurac...
MEJ. Mansoura Engineering Journal
Internet of Things has many applications requiring the use of wireless communications networks. I... more Internet of Things has many applications requiring the use of wireless communications networks. It utilizes data collection from sensor nodes connected to Wireless Sensor Networks. As such the wireless sensor networks is considered an important key for data transmission between sensor node and the gateways which are connected to the internet. Of the main concerns is the lifetime of the network which is affected by the battery power of the sensor nodes. It is noteworthy that transmission energy that dominates overall energy consumption is proportional to the distance between the transmitter and receiver. Thus, there is a need to send data from source node to a destination node in the most efficient way when it comes to battery level. Although there are many algorithms that tried to perform energy efficient routing, we will propose an intelligent algorithm to further improve this routing problem. In this paper we proposed an AI algorithm to enhance the lifetime of wireless sensor netw...
2021 31st International Conference on Computer Theory and Applications (ICCTA)
Complex & Intelligent Systems
The increase in people’s use of mobile messaging services has led to the spread of social enginee... more The increase in people’s use of mobile messaging services has led to the spread of social engineering attacks like phishing, considering that spam text is one of the main factors in the dissemination of phishing attacks to steal sensitive data such as credit cards and passwords. In addition, rumors and incorrect medical information regarding the COVID-19 pandemic are widely shared on social media leading to people’s fear and confusion. Thus, filtering spam content is vital to reduce risks and threats. Previous studies relied on machine learning and deep learning approaches for spam classification, but these approaches have two limitations. Machine learning models require manual feature engineering, whereas deep neural networks require a high computational cost. This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically. The proposed model utilizes convolutional and pooling layers for feature extraction along...
MEJ. Mansoura Engineering Journal, 2021
International Journal of Engineering, Jan 28, 2019
The emergence of the research topic of DNA in the field of Information Storage, Security and Cryp... more The emergence of the research topic of DNA in the field of Information Storage, Security and Cryptography has promised new heights to the field. DNA computing is a novel method of simulating the bio-molecular structure of DNA and computing. The promise it came with was a brand-new mean of data structure and calculation which would provide a brand-new generation for storage and more importantly, security and cryptography due to the wide array of parallelism in DNA. The field of cryptography would thrive if the DNA is properly used as it can realize several security technologies such as Encryption, Steganography, Signature and Authentication through the DNA molecular as information medium. This work presents the broad idea of using the existing DNA cryptosystems which utilize the use of the four DNA symbols (A, T, C and G) that represent the four binary two-tuples (00, 01, 10, and 11). However, the obstacles facing the DNA cryptography systems stand in the influence of Turing in the corresponding theoretical computing model. Where it stands in the theoretical stage, it seems to have the ability to solve major problems regarding the security of systems through cryptography.
I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic... more I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic Security based on AES and DNA Computing," has been submitted in support of an application for another degree or qualification of this or any other university or other institution of learning.
Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cove... more Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cover an area to collect data. These sensor nodes are work on the power source Therefore the battery energy of sensor nodes has to be very carefully and cleverly utilized. Additionally, it is also very important to balance the energy consumption of the nodes so that the network stay connected and functional for a long time. Wireless communications have become very pervasive over the time period. WSNs have wide range of application such as traffic analysis, environmental monitoring, industrial process monitoring, and tactical simulations. In WSN, the data packets are transmitted from source node to destination through several intermediate nodes which forward data packets towards the next one hop neighbor. However, each node participates simultaneously in several data transmissions. Each technique of packet scheduling is used for improving the efficiency of the network based on certain performance metrics and scheduling factor and every technique having some limitations.
2018 28th International Conference on Computer Theory and Applications (ICCTA), 2018
DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.
MEJ. Mansoura Engineering Journal, 2021
The process of information propagation through the Internet may expose it to risk by discovering ... more The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium to get secret communication. There are several challenges facing the process of data hiding in images, such as embedding capacity, image quality, security, and computational complexity. In order to handle these challenges, this paper brings out a new data hiding system for true color images. The proposed system combines the merits of imperceptibility feature of LSB technique working in spatial domain with robust embedding policy based on salient features guided by human visual perception extracted from transform domain. The system translates the images into HSV color space that has the ability to isolate chromatic and achromatic components with the aim of increasing hiding quality. To improve security of embedding locations, the system uses secret-key for wavelet decomposition. In our ca...
2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017
Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.
Transactions on networks and communications, Jun 12, 2014
Information Technology (IT) field before cloud computing is not the same after. It has recently a... more Information Technology (IT) field before cloud computing is not the same after. It has recently accelerated as new criteria for presenting and delivering services over the Internet. Cloud Computing is reacting positively as a concept that may greatly improve the smart devices (Smartphone, Tablet and Fablet) reliability. This paper mainly concentrates to enhance the smart devices dependability through and applications (app) during offloading of services among cloud and device to save energy, many challenges had faced that idea ex: unstable network, unstable Internet services, Synchronization and the limitations of open source smart devices operating system (OS). In order to cure the earlier challenges, An Android OS used with a new layer to offload the non-critical app's jobs. That should occur in One's of two clouds developed specially to do that, the first cloud is a private, connected with smart device through the same data network on-line and the second cloud is a public, related to the previous cloud and the smart device off-line when Internet exists. Using this system, Smart device users may choose to run their mobile application jobs either locally or offloading it to the cloud, this shall save energy spent from the smart device battery when using Third generation of mobile network (3G) or WI-FI. This system has achieved in the provision of high-energy reached 98.67% and will be seen in the context of this research paper.
Transactions on Networks and Communications, May 2, 2015
Data Warehouse (DW) is one of the solutions for decision-making process in a business organizatio... more Data Warehouse (DW) is one of the solutions for decision-making process in a business organization. But it only stores data for managerial purpose and it has no intelligent mechanism for decision making. For improving the process of decision making and searching Data Warehouse (DW) of the medical resources (items), where this study includes an application on a Data Warehouse (DW) of medical resources (items).In this paper, we merged the fuzzy rule with cluster index technique. where The proposed technique is named Fuzzy Cluster Index technique (FCI) to improve and speed up Queries fuzzy rule and process of decision making and management medical (items), The performance evaluation of three data warehouse queries is focused in this paper by comparing with Fuzzy cluster index technique (FCI), Fuzzy Rule and Index-based Apriori Algorithm to observe the results of variable size dataset with respect to time. Eventually, the designed system was constructed and executed by using (C# version 2010) which is a visual and object oriented programming language. This proves the efficiency of the proposed system for improving searching in Data Warehouse (DW) and the decision support system for the medical items in a perfect way.
Over the past decade, Business Intelligence (BI) has been adopted by major corporations around th... more Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on documentation, data based and departmental involvement for taking decisions. This
International Journal of Remote Sensing, 1996
ABSTRACT
Computer Applications in Engineering Education, 1995
In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major obj... more In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major objective of this work was to investigate the potential of using such systems as tools for transferring instructional course information through various types of computer media as opposed to the classic CAL systems. The philosophy and techniques employed to design the system are investigated. Usage of the implemented system and its merits have been illustrated through its application to teach engineering students and technicians the theory and concepts of marine radar. System design, implementation, test, and revision phases are presented and discussed.
In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.
Compression is the art of representing information in a compressed form and not in its original o... more Compression is the art of representing information in a compressed form and not in its original or uncompressed form. In other words, using data compression. Image compression is a critical task in image processing, the use of discrete shearlet and improved image compression and quality. With the event within the field of networking and within the process of sending and receiving files, we would have liked effective techniques for compression because the raw images required large amounts of disc space to effect during transportation and storage operations. In this paper, we have proposed a system for lossless picture compression using Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). We use lossless compression to take care of the first image during that process, but there's a serious problem which is frequently the low compression ratios. The main objective of image compression is to reduce the frequency of image data, whi...
International Journal of Computational Intelligence Systems
The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by en... more The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread adoption of IoT has also brought forth significant security challenges for manufacturers and consumers alike. Detecting network intrusions in IoT networks using machine learning techniques shows promising potential. However, selecting an appropriate machine learning algorithm for intrusion detection poses a considerable challenge. Improper algorithm selection can lead to reduced detection accuracy, increased risk of network infection, and compromised network security. This article provides a comparative evaluation to six state-of-the-art boosting-based algorithms for detecting intrusions in IoT. The methodology overview involves benchmarking the performance of the selected boosting-based algorithms in multi-class classification. The evaluation includes a comprehensive classification performance analysis includes accurac...
MEJ. Mansoura Engineering Journal
Internet of Things has many applications requiring the use of wireless communications networks. I... more Internet of Things has many applications requiring the use of wireless communications networks. It utilizes data collection from sensor nodes connected to Wireless Sensor Networks. As such the wireless sensor networks is considered an important key for data transmission between sensor node and the gateways which are connected to the internet. Of the main concerns is the lifetime of the network which is affected by the battery power of the sensor nodes. It is noteworthy that transmission energy that dominates overall energy consumption is proportional to the distance between the transmitter and receiver. Thus, there is a need to send data from source node to a destination node in the most efficient way when it comes to battery level. Although there are many algorithms that tried to perform energy efficient routing, we will propose an intelligent algorithm to further improve this routing problem. In this paper we proposed an AI algorithm to enhance the lifetime of wireless sensor netw...
2021 31st International Conference on Computer Theory and Applications (ICCTA)
Complex & Intelligent Systems
The increase in people’s use of mobile messaging services has led to the spread of social enginee... more The increase in people’s use of mobile messaging services has led to the spread of social engineering attacks like phishing, considering that spam text is one of the main factors in the dissemination of phishing attacks to steal sensitive data such as credit cards and passwords. In addition, rumors and incorrect medical information regarding the COVID-19 pandemic are widely shared on social media leading to people’s fear and confusion. Thus, filtering spam content is vital to reduce risks and threats. Previous studies relied on machine learning and deep learning approaches for spam classification, but these approaches have two limitations. Machine learning models require manual feature engineering, whereas deep neural networks require a high computational cost. This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically. The proposed model utilizes convolutional and pooling layers for feature extraction along...
MEJ. Mansoura Engineering Journal, 2021
International Journal of Engineering, Jan 28, 2019
The emergence of the research topic of DNA in the field of Information Storage, Security and Cryp... more The emergence of the research topic of DNA in the field of Information Storage, Security and Cryptography has promised new heights to the field. DNA computing is a novel method of simulating the bio-molecular structure of DNA and computing. The promise it came with was a brand-new mean of data structure and calculation which would provide a brand-new generation for storage and more importantly, security and cryptography due to the wide array of parallelism in DNA. The field of cryptography would thrive if the DNA is properly used as it can realize several security technologies such as Encryption, Steganography, Signature and Authentication through the DNA molecular as information medium. This work presents the broad idea of using the existing DNA cryptosystems which utilize the use of the four DNA symbols (A, T, C and G) that represent the four binary two-tuples (00, 01, 10, and 11). However, the obstacles facing the DNA cryptography systems stand in the influence of Turing in the corresponding theoretical computing model. Where it stands in the theoretical stage, it seems to have the ability to solve major problems regarding the security of systems through cryptography.
I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic... more I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic Security based on AES and DNA Computing," has been submitted in support of an application for another degree or qualification of this or any other university or other institution of learning.
Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cove... more Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cover an area to collect data. These sensor nodes are work on the power source Therefore the battery energy of sensor nodes has to be very carefully and cleverly utilized. Additionally, it is also very important to balance the energy consumption of the nodes so that the network stay connected and functional for a long time. Wireless communications have become very pervasive over the time period. WSNs have wide range of application such as traffic analysis, environmental monitoring, industrial process monitoring, and tactical simulations. In WSN, the data packets are transmitted from source node to destination through several intermediate nodes which forward data packets towards the next one hop neighbor. However, each node participates simultaneously in several data transmissions. Each technique of packet scheduling is used for improving the efficiency of the network based on certain performance metrics and scheduling factor and every technique having some limitations.
2018 28th International Conference on Computer Theory and Applications (ICCTA), 2018
DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.
MEJ. Mansoura Engineering Journal, 2021
The process of information propagation through the Internet may expose it to risk by discovering ... more The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium to get secret communication. There are several challenges facing the process of data hiding in images, such as embedding capacity, image quality, security, and computational complexity. In order to handle these challenges, this paper brings out a new data hiding system for true color images. The proposed system combines the merits of imperceptibility feature of LSB technique working in spatial domain with robust embedding policy based on salient features guided by human visual perception extracted from transform domain. The system translates the images into HSV color space that has the ability to isolate chromatic and achromatic components with the aim of increasing hiding quality. To improve security of embedding locations, the system uses secret-key for wavelet decomposition. In our ca...
2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017
Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.
Transactions on networks and communications, Jun 12, 2014
Information Technology (IT) field before cloud computing is not the same after. It has recently a... more Information Technology (IT) field before cloud computing is not the same after. It has recently accelerated as new criteria for presenting and delivering services over the Internet. Cloud Computing is reacting positively as a concept that may greatly improve the smart devices (Smartphone, Tablet and Fablet) reliability. This paper mainly concentrates to enhance the smart devices dependability through and applications (app) during offloading of services among cloud and device to save energy, many challenges had faced that idea ex: unstable network, unstable Internet services, Synchronization and the limitations of open source smart devices operating system (OS). In order to cure the earlier challenges, An Android OS used with a new layer to offload the non-critical app's jobs. That should occur in One's of two clouds developed specially to do that, the first cloud is a private, connected with smart device through the same data network on-line and the second cloud is a public, related to the previous cloud and the smart device off-line when Internet exists. Using this system, Smart device users may choose to run their mobile application jobs either locally or offloading it to the cloud, this shall save energy spent from the smart device battery when using Third generation of mobile network (3G) or WI-FI. This system has achieved in the provision of high-energy reached 98.67% and will be seen in the context of this research paper.
Transactions on Networks and Communications, May 2, 2015
Data Warehouse (DW) is one of the solutions for decision-making process in a business organizatio... more Data Warehouse (DW) is one of the solutions for decision-making process in a business organization. But it only stores data for managerial purpose and it has no intelligent mechanism for decision making. For improving the process of decision making and searching Data Warehouse (DW) of the medical resources (items), where this study includes an application on a Data Warehouse (DW) of medical resources (items).In this paper, we merged the fuzzy rule with cluster index technique. where The proposed technique is named Fuzzy Cluster Index technique (FCI) to improve and speed up Queries fuzzy rule and process of decision making and management medical (items), The performance evaluation of three data warehouse queries is focused in this paper by comparing with Fuzzy cluster index technique (FCI), Fuzzy Rule and Index-based Apriori Algorithm to observe the results of variable size dataset with respect to time. Eventually, the designed system was constructed and executed by using (C# version 2010) which is a visual and object oriented programming language. This proves the efficiency of the proposed system for improving searching in Data Warehouse (DW) and the decision support system for the medical items in a perfect way.
Over the past decade, Business Intelligence (BI) has been adopted by major corporations around th... more Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on documentation, data based and departmental involvement for taking decisions. This
International Journal of Remote Sensing, 1996
ABSTRACT
Computer Applications in Engineering Education, 1995
In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major obj... more In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major objective of this work was to investigate the potential of using such systems as tools for transferring instructional course information through various types of computer media as opposed to the classic CAL systems. The philosophy and techniques employed to design the system are investigated. Usage of the implemented system and its merits have been illustrated through its application to teach engineering students and technicians the theory and concepts of marine radar. System design, implementation, test, and revision phases are presented and discussed.
In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.
Compression is the art of representing information in a compressed form and not in its original o... more Compression is the art of representing information in a compressed form and not in its original or uncompressed form. In other words, using data compression. Image compression is a critical task in image processing, the use of discrete shearlet and improved image compression and quality. With the event within the field of networking and within the process of sending and receiving files, we would have liked effective techniques for compression because the raw images required large amounts of disc space to effect during transportation and storage operations. In this paper, we have proposed a system for lossless picture compression using Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). We use lossless compression to take care of the first image during that process, but there's a serious problem which is frequently the low compression ratios. The main objective of image compression is to reduce the frequency of image data, whi...