Shawkat Guirguis | Alexandria University (original) (raw)

Papers by Shawkat Guirguis

Research paper thumbnail of A Comparative Study of Using Boosting-Based Machine Learning Algorithms for IoT Network Intrusion Detection

International Journal of Computational Intelligence Systems

The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by en... more The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread adoption of IoT has also brought forth significant security challenges for manufacturers and consumers alike. Detecting network intrusions in IoT networks using machine learning techniques shows promising potential. However, selecting an appropriate machine learning algorithm for intrusion detection poses a considerable challenge. Improper algorithm selection can lead to reduced detection accuracy, increased risk of network infection, and compromised network security. This article provides a comparative evaluation to six state-of-the-art boosting-based algorithms for detecting intrusions in IoT. The methodology overview involves benchmarking the performance of the selected boosting-based algorithms in multi-class classification. The evaluation includes a comprehensive classification performance analysis includes accurac...

Research paper thumbnail of Quantitative Inference of Decision Making Strategies under Inherent Knowledge Uncertainties.(Dept.E)

MEJ. Mansoura Engineering Journal

Research paper thumbnail of A Supervised Neural Network Machine Learning Routing Algorithm to Improve the Lifetime of Heterogeneous Wireless Sensor Networks

Internet of Things has many applications requiring the use of wireless communications networks. I... more Internet of Things has many applications requiring the use of wireless communications networks. It utilizes data collection from sensor nodes connected to Wireless Sensor Networks. As such the wireless sensor networks is considered an important key for data transmission between sensor node and the gateways which are connected to the internet. Of the main concerns is the lifetime of the network which is affected by the battery power of the sensor nodes. It is noteworthy that transmission energy that dominates overall energy consumption is proportional to the distance between the transmitter and receiver. Thus, there is a need to send data from source node to a destination node in the most efficient way when it comes to battery level. Although there are many algorithms that tried to perform energy efficient routing, we will propose an intelligent algorithm to further improve this routing problem. In this paper we proposed an AI algorithm to enhance the lifetime of wireless sensor netw...

Research paper thumbnail of Arabic Language Sentiment Analysis Using Feature Engineering and Deep Learning RNN-LSTM Framework

2021 31st International Conference on Computer Theory and Applications (ICCTA)

Research paper thumbnail of Deep convolutional forest: a dynamic deep ensemble approach for spam detection in text

Complex & Intelligent Systems

The increase in people’s use of mobile messaging services has led to the spread of social enginee... more The increase in people’s use of mobile messaging services has led to the spread of social engineering attacks like phishing, considering that spam text is one of the main factors in the dissemination of phishing attacks to steal sensitive data such as credit cards and passwords. In addition, rumors and incorrect medical information regarding the COVID-19 pandemic are widely shared on social media leading to people’s fear and confusion. Thus, filtering spam content is vital to reduce risks and threats. Previous studies relied on machine learning and deep learning approaches for spam classification, but these approaches have two limitations. Machine learning models require manual feature engineering, whereas deep neural networks require a high computational cost. This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically. The proposed model utilizes convolutional and pooling layers for feature extraction along...

Research paper thumbnail of Building Live Virtual Classroom System Using Software Agents and IP-Multicast. (Dept. E)

MEJ. Mansoura Engineering Journal, 2021

Research paper thumbnail of DNA Computing and Its Application to Information and Data Security Field?: A Survey

International Journal of Engineering, Jan 28, 2019

The emergence of the research topic of DNA in the field of Information Storage, Security and Cryp... more The emergence of the research topic of DNA in the field of Information Storage, Security and Cryptography has promised new heights to the field. DNA computing is a novel method of simulating the bio-molecular structure of DNA and computing. The promise it came with was a brand-new mean of data structure and calculation which would provide a brand-new generation for storage and more importantly, security and cryptography due to the wide array of parallelism in DNA. The field of cryptography would thrive if the DNA is properly used as it can realize several security technologies such as Encryption, Steganography, Signature and Authentication through the DNA molecular as information medium. This work presents the broad idea of using the existing DNA cryptosystems which utilize the use of the four DNA symbols (A, T, C and G) that represent the four binary two-tuples (00, 01, 10, and 11). However, the obstacles facing the DNA cryptography systems stand in the influence of Turing in the corresponding theoretical computing model. Where it stands in the theoretical stage, it seems to have the ability to solve major problems regarding the security of systems through cryptography.

Research paper thumbnail of Enhancing Cryptographic Security based on AES and DNA Computing تعزيز التشفير الأمني أستناداً على معيار التشفير المتقدم و حوسبة الحمض النووي

I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic... more I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic Security based on AES and DNA Computing," has been submitted in support of an application for another degree or qualification of this or any other university or other institution of learning.

Research paper thumbnail of Real-Time and Non-Real Time Packet Scheduling Schemes of Wireless Sensor Networks

Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cove... more Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cover an area to collect data. These sensor nodes are work on the power source Therefore the battery energy of sensor nodes has to be very carefully and cleverly utilized. Additionally, it is also very important to balance the energy consumption of the nodes so that the network stay connected and functional for a long time. Wireless communications have become very pervasive over the time period. WSNs have wide range of application such as traffic analysis, environmental monitoring, industrial process monitoring, and tactical simulations. In WSN, the data packets are transmitted from source node to destination through several intermediate nodes which forward data packets towards the next one hop neighbor. However, each node participates simultaneously in several data transmissions. Each technique of packet scheduling is used for improving the efficiency of the network based on certain performance metrics and scheduling factor and every technique having some limitations.

Research paper thumbnail of Enhancing AES Algorithm with DNA Computing

2018 28th International Conference on Computer Theory and Applications (ICCTA), 2018

DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.

Research paper thumbnail of A Framework for Improving Software Reusability within Quality Constraints.(Dept.E)

MEJ. Mansoura Engineering Journal, 2021

Research paper thumbnail of An Enhanced Steganographic System for Data Hiding in True Color Images

The process of information propagation through the Internet may expose it to risk by discovering ... more The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium to get secret communication. There are several challenges facing the process of data hiding in images, such as embedding capacity, image quality, security, and computational complexity. In order to handle these challenges, this paper brings out a new data hiding system for true color images. The proposed system combines the merits of imperceptibility feature of LSB technique working in spatial domain with robust embedding policy based on salient features guided by human visual perception extracted from transform domain. The system translates the images into HSV color space that has the ability to isolate chromatic and achromatic components with the aim of increasing hiding quality. To improve security of embedding locations, the system uses secret-key for wavelet decomposition. In our ca...

Research paper thumbnail of Investigation of cryptography algorithms used for security and privacy protection in smart grid

2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017

Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.

Research paper thumbnail of Cloud Computing and Offloading Framework for enhancing Android Smart Device Battery Life

Transactions on networks and communications, Jun 12, 2014

Information Technology (IT) field before cloud computing is not the same after. It has recently a... more Information Technology (IT) field before cloud computing is not the same after. It has recently accelerated as new criteria for presenting and delivering services over the Internet. Cloud Computing is reacting positively as a concept that may greatly improve the smart devices (Smartphone, Tablet and Fablet) reliability. This paper mainly concentrates to enhance the smart devices dependability through and applications (app) during offloading of services among cloud and device to save energy, many challenges had faced that idea ex: unstable network, unstable Internet services, Synchronization and the limitations of open source smart devices operating system (OS). In order to cure the earlier challenges, An Android OS used with a new layer to offload the non-critical app's jobs. That should occur in One's of two clouds developed specially to do that, the first cloud is a private, connected with smart device through the same data network on-line and the second cloud is a public, related to the previous cloud and the smart device off-line when Internet exists. Using this system, Smart device users may choose to run their mobile application jobs either locally or offloading it to the cloud, this shall save energy spent from the smart device battery when using Third generation of mobile network (3G) or WI-FI. This system has achieved in the provision of high-energy reached 98.67% and will be seen in the context of this research paper.

Research paper thumbnail of Applying Fuzzy cluster index to improve searching in data warehouse

Transactions on Networks and Communications, May 2, 2015

Data Warehouse (DW) is one of the solutions for decision-making process in a business organizatio... more Data Warehouse (DW) is one of the solutions for decision-making process in a business organization. But it only stores data for managerial purpose and it has no intelligent mechanism for decision making. For improving the process of decision making and searching Data Warehouse (DW) of the medical resources (items), where this study includes an application on a Data Warehouse (DW) of medical resources (items).In this paper, we merged the fuzzy rule with cluster index technique. where The proposed technique is named Fuzzy Cluster Index technique (FCI) to improve and speed up Queries fuzzy rule and process of decision making and management medical (items), The performance evaluation of three data warehouse queries is focused in this paper by comparing with Fuzzy cluster index technique (FCI), Fuzzy Rule and Index-based Apriori Algorithm to observe the results of variable size dataset with respect to time. Eventually, the designed system was constructed and executed by using (C# version 2010) which is a visual and object oriented programming language. This proves the efficiency of the proposed system for improving searching in Data Warehouse (DW) and the decision support system for the medical items in a perfect way.

Research paper thumbnail of Development of a Dynamic Model for Data-Driven DSS

Over the past decade, Business Intelligence (BI) has been adopted by major corporations around th... more Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on documentation, data based and departmental involvement for taking decisions. This

Research paper thumbnail of Technical Note Multi-temporal change of Lake Brullus, Egypt, from 1983 to 1991

International Journal of Remote Sensing, 1996

ABSTRACT

Research paper thumbnail of Development and application of MCAL tools for marine radar instruction

Computer Applications in Engineering Education, 1995

In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major obj... more In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major objective of this work was to investigate the potential of using such systems as tools for transferring instructional course information through various types of computer media as opposed to the classic CAL systems. The philosophy and techniques employed to design the system are investigated. Usage of the implemented system and its merits have been illustrated through its application to teach engineering students and technicians the theory and concepts of marine radar. System design, implementation, test, and revision phases are presented and discussed.

Research paper thumbnail of Hybrid Compression based Stationary Wavelet Transforms

In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.

Research paper thumbnail of Lossless Biometric Signal Compression

Compression is the art of representing information in a compressed form and not in its original o... more Compression is the art of representing information in a compressed form and not in its original or uncompressed form. In other words, using data compression. Image compression is a critical task in image processing, the use of discrete shearlet and improved image compression and quality. With the event within the field of networking and within the process of sending and receiving files, we would have liked effective techniques for compression because the raw images required large amounts of disc space to effect during transportation and storage operations. In this paper, we have proposed a system for lossless picture compression using Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). We use lossless compression to take care of the first image during that process, but there's a serious problem which is frequently the low compression ratios. The main objective of image compression is to reduce the frequency of image data, whi...

Research paper thumbnail of A Comparative Study of Using Boosting-Based Machine Learning Algorithms for IoT Network Intrusion Detection

International Journal of Computational Intelligence Systems

The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by en... more The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread adoption of IoT has also brought forth significant security challenges for manufacturers and consumers alike. Detecting network intrusions in IoT networks using machine learning techniques shows promising potential. However, selecting an appropriate machine learning algorithm for intrusion detection poses a considerable challenge. Improper algorithm selection can lead to reduced detection accuracy, increased risk of network infection, and compromised network security. This article provides a comparative evaluation to six state-of-the-art boosting-based algorithms for detecting intrusions in IoT. The methodology overview involves benchmarking the performance of the selected boosting-based algorithms in multi-class classification. The evaluation includes a comprehensive classification performance analysis includes accurac...

Research paper thumbnail of Quantitative Inference of Decision Making Strategies under Inherent Knowledge Uncertainties.(Dept.E)

MEJ. Mansoura Engineering Journal

Research paper thumbnail of A Supervised Neural Network Machine Learning Routing Algorithm to Improve the Lifetime of Heterogeneous Wireless Sensor Networks

Internet of Things has many applications requiring the use of wireless communications networks. I... more Internet of Things has many applications requiring the use of wireless communications networks. It utilizes data collection from sensor nodes connected to Wireless Sensor Networks. As such the wireless sensor networks is considered an important key for data transmission between sensor node and the gateways which are connected to the internet. Of the main concerns is the lifetime of the network which is affected by the battery power of the sensor nodes. It is noteworthy that transmission energy that dominates overall energy consumption is proportional to the distance between the transmitter and receiver. Thus, there is a need to send data from source node to a destination node in the most efficient way when it comes to battery level. Although there are many algorithms that tried to perform energy efficient routing, we will propose an intelligent algorithm to further improve this routing problem. In this paper we proposed an AI algorithm to enhance the lifetime of wireless sensor netw...

Research paper thumbnail of Arabic Language Sentiment Analysis Using Feature Engineering and Deep Learning RNN-LSTM Framework

2021 31st International Conference on Computer Theory and Applications (ICCTA)

Research paper thumbnail of Deep convolutional forest: a dynamic deep ensemble approach for spam detection in text

Complex & Intelligent Systems

The increase in people’s use of mobile messaging services has led to the spread of social enginee... more The increase in people’s use of mobile messaging services has led to the spread of social engineering attacks like phishing, considering that spam text is one of the main factors in the dissemination of phishing attacks to steal sensitive data such as credit cards and passwords. In addition, rumors and incorrect medical information regarding the COVID-19 pandemic are widely shared on social media leading to people’s fear and confusion. Thus, filtering spam content is vital to reduce risks and threats. Previous studies relied on machine learning and deep learning approaches for spam classification, but these approaches have two limitations. Machine learning models require manual feature engineering, whereas deep neural networks require a high computational cost. This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically. The proposed model utilizes convolutional and pooling layers for feature extraction along...

Research paper thumbnail of Building Live Virtual Classroom System Using Software Agents and IP-Multicast. (Dept. E)

MEJ. Mansoura Engineering Journal, 2021

Research paper thumbnail of DNA Computing and Its Application to Information and Data Security Field?: A Survey

International Journal of Engineering, Jan 28, 2019

The emergence of the research topic of DNA in the field of Information Storage, Security and Cryp... more The emergence of the research topic of DNA in the field of Information Storage, Security and Cryptography has promised new heights to the field. DNA computing is a novel method of simulating the bio-molecular structure of DNA and computing. The promise it came with was a brand-new mean of data structure and calculation which would provide a brand-new generation for storage and more importantly, security and cryptography due to the wide array of parallelism in DNA. The field of cryptography would thrive if the DNA is properly used as it can realize several security technologies such as Encryption, Steganography, Signature and Authentication through the DNA molecular as information medium. This work presents the broad idea of using the existing DNA cryptosystems which utilize the use of the four DNA symbols (A, T, C and G) that represent the four binary two-tuples (00, 01, 10, and 11). However, the obstacles facing the DNA cryptography systems stand in the influence of Turing in the corresponding theoretical computing model. Where it stands in the theoretical stage, it seems to have the ability to solve major problems regarding the security of systems through cryptography.

Research paper thumbnail of Enhancing Cryptographic Security based on AES and DNA Computing تعزيز التشفير الأمني أستناداً على معيار التشفير المتقدم و حوسبة الحمض النووي

I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic... more I declare that no portion of the work referred to in this thesis titled, "Enhancing Cryptographic Security based on AES and DNA Computing," has been submitted in support of an application for another degree or qualification of this or any other university or other institution of learning.

Research paper thumbnail of Real-Time and Non-Real Time Packet Scheduling Schemes of Wireless Sensor Networks

Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cove... more Typical wireless sensor networks (WSNs) comprise a lot of small, lightweight sensor nodes to cover an area to collect data. These sensor nodes are work on the power source Therefore the battery energy of sensor nodes has to be very carefully and cleverly utilized. Additionally, it is also very important to balance the energy consumption of the nodes so that the network stay connected and functional for a long time. Wireless communications have become very pervasive over the time period. WSNs have wide range of application such as traffic analysis, environmental monitoring, industrial process monitoring, and tactical simulations. In WSN, the data packets are transmitted from source node to destination through several intermediate nodes which forward data packets towards the next one hop neighbor. However, each node participates simultaneously in several data transmissions. Each technique of packet scheduling is used for improving the efficiency of the network based on certain performance metrics and scheduling factor and every technique having some limitations.

Research paper thumbnail of Enhancing AES Algorithm with DNA Computing

2018 28th International Conference on Computer Theory and Applications (ICCTA), 2018

DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.

Research paper thumbnail of A Framework for Improving Software Reusability within Quality Constraints.(Dept.E)

MEJ. Mansoura Engineering Journal, 2021

Research paper thumbnail of An Enhanced Steganographic System for Data Hiding in True Color Images

The process of information propagation through the Internet may expose it to risk by discovering ... more The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium to get secret communication. There are several challenges facing the process of data hiding in images, such as embedding capacity, image quality, security, and computational complexity. In order to handle these challenges, this paper brings out a new data hiding system for true color images. The proposed system combines the merits of imperceptibility feature of LSB technique working in spatial domain with robust embedding policy based on salient features guided by human visual perception extracted from transform domain. The system translates the images into HSV color space that has the ability to isolate chromatic and achromatic components with the aim of increasing hiding quality. To improve security of embedding locations, the system uses secret-key for wavelet decomposition. In our ca...

Research paper thumbnail of Investigation of cryptography algorithms used for security and privacy protection in smart grid

2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017

Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.

Research paper thumbnail of Cloud Computing and Offloading Framework for enhancing Android Smart Device Battery Life

Transactions on networks and communications, Jun 12, 2014

Information Technology (IT) field before cloud computing is not the same after. It has recently a... more Information Technology (IT) field before cloud computing is not the same after. It has recently accelerated as new criteria for presenting and delivering services over the Internet. Cloud Computing is reacting positively as a concept that may greatly improve the smart devices (Smartphone, Tablet and Fablet) reliability. This paper mainly concentrates to enhance the smart devices dependability through and applications (app) during offloading of services among cloud and device to save energy, many challenges had faced that idea ex: unstable network, unstable Internet services, Synchronization and the limitations of open source smart devices operating system (OS). In order to cure the earlier challenges, An Android OS used with a new layer to offload the non-critical app's jobs. That should occur in One's of two clouds developed specially to do that, the first cloud is a private, connected with smart device through the same data network on-line and the second cloud is a public, related to the previous cloud and the smart device off-line when Internet exists. Using this system, Smart device users may choose to run their mobile application jobs either locally or offloading it to the cloud, this shall save energy spent from the smart device battery when using Third generation of mobile network (3G) or WI-FI. This system has achieved in the provision of high-energy reached 98.67% and will be seen in the context of this research paper.

Research paper thumbnail of Applying Fuzzy cluster index to improve searching in data warehouse

Transactions on Networks and Communications, May 2, 2015

Data Warehouse (DW) is one of the solutions for decision-making process in a business organizatio... more Data Warehouse (DW) is one of the solutions for decision-making process in a business organization. But it only stores data for managerial purpose and it has no intelligent mechanism for decision making. For improving the process of decision making and searching Data Warehouse (DW) of the medical resources (items), where this study includes an application on a Data Warehouse (DW) of medical resources (items).In this paper, we merged the fuzzy rule with cluster index technique. where The proposed technique is named Fuzzy Cluster Index technique (FCI) to improve and speed up Queries fuzzy rule and process of decision making and management medical (items), The performance evaluation of three data warehouse queries is focused in this paper by comparing with Fuzzy cluster index technique (FCI), Fuzzy Rule and Index-based Apriori Algorithm to observe the results of variable size dataset with respect to time. Eventually, the designed system was constructed and executed by using (C# version 2010) which is a visual and object oriented programming language. This proves the efficiency of the proposed system for improving searching in Data Warehouse (DW) and the decision support system for the medical items in a perfect way.

Research paper thumbnail of Development of a Dynamic Model for Data-Driven DSS

Over the past decade, Business Intelligence (BI) has been adopted by major corporations around th... more Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on documentation, data based and departmental involvement for taking decisions. This

Research paper thumbnail of Technical Note Multi-temporal change of Lake Brullus, Egypt, from 1983 to 1991

International Journal of Remote Sensing, 1996

ABSTRACT

Research paper thumbnail of Development and application of MCAL tools for marine radar instruction

Computer Applications in Engineering Education, 1995

In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major obj... more In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major objective of this work was to investigate the potential of using such systems as tools for transferring instructional course information through various types of computer media as opposed to the classic CAL systems. The philosophy and techniques employed to design the system are investigated. Usage of the implemented system and its merits have been illustrated through its application to teach engineering students and technicians the theory and concepts of marine radar. System design, implementation, test, and revision phases are presented and discussed.

Research paper thumbnail of Hybrid Compression based Stationary Wavelet Transforms

In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.

Research paper thumbnail of Lossless Biometric Signal Compression

Compression is the art of representing information in a compressed form and not in its original o... more Compression is the art of representing information in a compressed form and not in its original or uncompressed form. In other words, using data compression. Image compression is a critical task in image processing, the use of discrete shearlet and improved image compression and quality. With the event within the field of networking and within the process of sending and receiving files, we would have liked effective techniques for compression because the raw images required large amounts of disc space to effect during transportation and storage operations. In this paper, we have proposed a system for lossless picture compression using Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). We use lossless compression to take care of the first image during that process, but there's a serious problem which is frequently the low compression ratios. The main objective of image compression is to reduce the frequency of image data, whi...