Mohamed abdelfattah | Benha University (original) (raw)

Uploads

Papers by Mohamed abdelfattah

Research paper thumbnail of Security in MANET based on PKI using fuzzy function

IOSR Journal of Computer Engineering, 2012

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this... more In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.

Research paper thumbnail of Adaptive Model for Disability Determination Decision Process Based on Natural Language Processing

Research paper thumbnail of Can Wikipedia Be A Reliable Source For Translation?Testing Wikipedia Cross Lingual Coverage of Medical Domain

This paper introduces Wiki-Transpose, a query translation system for cross-lingual information re... more This paper introduces Wiki-Transpose, a query translation system for cross-lingual information retrieval (CLIR). Wiki-Transpose rely only on Wikipedia as information source for translations. The main goal of this paper is to check the coverage ratio of Wikipedia against specializedqueries that are related to medical domain. Wiki-Transpose was evaluated using bothEnglish and Portuguese medical queries. Queries are mapped into both English and Portuguese Wikipedia concepts. Experiments showed that Wikipedia coverage ratio of queries is inversely proportional to the query size. Wikipedia coverage of single English term query is about 81%, and 80% for single Portuguese term query. This ratio is decreased when the number of terms in query increased. However in the case of query translation, Wikipedia showed a comparative performance for (English – Portuguese) and (Portuguese – English) translation. In English – Portuguese translation, Wikipedia showed coverage ratio around 60% for single term queries, compared to 88% for Portuguese – English single term queries. The translation coverage ratio is also decreased when number of terms in query increase.

Research paper thumbnail of AIS MODEL FOR BOTNET DETECTION IN MANET USING FUZZY FUNCTION   By A.A.SALAMA

Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is... more Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is due to the lake of infrastructure and the continuous changing in the network topology. Botnets are believed to be the most harmful danger that threatens any type of networks; because it controls the units in a non noticeable manner so detection of botnets is more difficult . in this paper the Artificial Immune System (AIS) is used as the defense system to the MANET to face botnets.

Research paper thumbnail of Security in MANET based on PKI using fuzzy function

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this... more In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.

Research paper thumbnail of A Conceptual Model for Visual Monitorting Information System (VMIS) for the Strategic Plan

Strategic planning is most effective when implemented as an integral part of institutional decisi... more Strategic planning is most effective when implemented as an integral part of institutional decision-making, not as a separate formal, comprehensive activity. Measuring and managing performance is a challenging enterprise and seen as one of the keys to managing change and thus gaining competitive advantage in organizations. organizations need to assess and enhance their activities, in order to provide a monitoring the strategic planning , and to measure future capability as well as past performance. The efficiency of organization have given rise to new models and systems aimed at facilitating strategic decision making, primarily concerned with strategic planning assessment In this direction the design and adoption of a well-informed strategic management will increase the overall quality of those services. This paper suggests an information system for managing strategic planning that is highly quality-assured., by using of dynamic real-time visual representations in the strategy monitoring .AVMIS information system allows efficient decision making to be made at appropriate level of management. A prototypical web-based implementation is presented and discussed.

Research paper thumbnail of Some Intuitionistic Topological Notions of Intuitionistic Region, Possible Application to GIS Topological Rules

In Geographical information systems (GIS) there is a need to model spatial regions with intuition... more In Geographical information systems (GIS) there is a need to model spatial regions with intuitionistic boundary. In this paper, we generalize the topological ideals spaces to the notion of intuitionistic set; we construct the basic fundamental concepts and properties of an intuitionistic spatial region. In addition, we introduce the notion of ideals on intuitionistic set which is considered as a generalization of ideals studies in [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16]. The important topological intuitionistic ideal has been given. The concept of intuitionistic local function is also introduced for a intuitionistic topological space. These concepts are discussed with a view to find new intuitionistic topology from the original one. The basic structure, especially a basis for such generated intuitionistic topologies and several relations between different topological intuitionistic ideals are also studied here. Possible
application to GIS topology rules are touched upon.

Research paper thumbnail of Distances, Hesitancy Degree and Flexible Querying via Neutrosophic Sets

Since the world is full of indeterminacy, the neutrosophics found their place into contemporary r... more Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. İn this paper we, introduce the distances between neutrosophic sets: the Hamming distance, The normalized Hamming distance, the Euclidean distance and normalized Euclidean distance. We will extend the concepts of distances to the case of neutrosophic hesitancy degree. Added to, this paper suggest how to enrich intuitionistic fuzzy querying by the use of neutrosophic values..

Research paper thumbnail of DASHBOARD TECHNOLOGY BASED SOLUTION TO DECISION MAKING

The continuing development of DSS applications requires that new technologies be exploited to all... more The continuing development of DSS applications requires that new technologies be exploited to allow new classes of decision be supported. In most domains, problem-solving and decision-making are overwhelming because of the high volume of complicated data, the multiple complex relationships among data, the negotiability of the constraints, the changing environment, uncertainty and time pressure. Dashboard enables executives to measure, monitor and manage organization performance more effectively this paper proposes a framework for Dashboard DSS that integrates dashboard and Problem solving within enterprise functionality. Finally an DSS system for higher education planning is introduced to illustrate the application of the methodology and evaluate the using of dashboard as a decision making tools.

Research paper thumbnail of A Novel Model for Implementing Security over Mobile Ad-hoc Networks using Intuitionistic Fuzzy Function

Mobile adhoc network is a special kind of wireless networks. It is a collection of mobile nodes w... more Mobile adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile adhoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, Securing temporal networks like Mobile Ad-hoc Networks (MANETs) has been given a great amount of attention recently, though the process of creating a perfectly secured scheme has not been accomplished yet. MANETs has some other features and characteristics those are together make it a difficult environment to be secured. The bandwidth of MANET is another challenge because it is unlikely to consume the bandwidth in security mechanisms rather than data traffic. This paper proposes a security scheme based on Public Key infrastructure (PKI) for distributing session keys between nodes. The length of those keys is decided using intuitionistic fuzzy logic manipulation. The proposed algorithm of Security-model is an adaptive intuitionistic fuzzy logic based algorithm that can adapt itself according to the dynamic conditions of mobile hosts. Finally the Experimental results shows that the using of intuitionistic fuzzy based security can enhance the security of (MANETs).

Research paper thumbnail of AIS MODEL FOR BOTNET DETECTION IN MANET USING FUZZY FUNCTION

Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is... more Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is due to the lake of infrastructure and the continuous changing in the network topology. Botnets are believed to be the most harmful danger that threatens any type of networks; because it controls the units in a non noticeable manner so detection of botnets is more difficult . in this paper the Artificial Immune System (AIS) is used as the defense system to the MANET to face botnets. Experimental results show that the use of fuzzy based security can enhance the security of AIS in MANETs.

Research paper thumbnail of Security in MANET based on PKI using fuzzy function

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this... more In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.

Research paper thumbnail of Visual Model for Managing Educational Capacity Utilization in Egyptian Universities

The importance of quality service in Higher Education Institutions (HEI) has increased in ... more The importance of quality service in Higher

Education Institutions (HEI) has increased in recent years. Educational institutions need to assess and enhance their activities, in order to provide a balance of educational capacity and educational supply, and to measure future capability as well as past performance. In this direction the design and adoption of a well-informed strategic management will increase the overall quality of those services.

The number of students In Egyptian universities in each faculty varied from one to another depending on multi variables. No strategic planning to joined students. Academic workload management is concerned with distributing teaching resources in order to adequately support the university’s educational framework (faculties, degrees, courses, admission policies, teaching workload etc). The admissions process must admit students in such a manner as to achieve an efficient utilization of university resources.. This paper proposes a visual model for estimating educational capacity and planning its distribution and utilization in universities.

Research paper thumbnail of A Comparison of Several Performance Dashboards Architectures

A performance dashboard is a full-fledged business information system that is built on a business... more A performance dashboard is a full-fledged business information system that is built on a business-intelligence and dataintegration infrastructure. It has been one of the most hot research topics. Now many corporations have involved in the performance dashboard Architectures related techniques and many performance dashboard Architectures have been put forward. This is a favorable situation to study and application of performance dashboard related techniques. Though interesting, there are also some problems for so many Architectures forms. For to a novice or user with little knowledge about performance dashboard Architectures, it is still very hard to make a reasonable choice. What differences are there for different performance dashboard Architectures and what characteristics and advantages each has? To answer these problems, the characteristics, architectures and applications of several popular performance dashboard Architectures are analyzed and discussed in detail. From the comparison of these Architectures, users can better understand the different performance dashboard Architectures and more reasonably choose what they want.

Research paper thumbnail of Security in MANET based on PKI using fuzzy function

IOSR Journal of Computer Engineering, 2012

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this... more In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.

Research paper thumbnail of Adaptive Model for Disability Determination Decision Process Based on Natural Language Processing

Research paper thumbnail of Can Wikipedia Be A Reliable Source For Translation?Testing Wikipedia Cross Lingual Coverage of Medical Domain

This paper introduces Wiki-Transpose, a query translation system for cross-lingual information re... more This paper introduces Wiki-Transpose, a query translation system for cross-lingual information retrieval (CLIR). Wiki-Transpose rely only on Wikipedia as information source for translations. The main goal of this paper is to check the coverage ratio of Wikipedia against specializedqueries that are related to medical domain. Wiki-Transpose was evaluated using bothEnglish and Portuguese medical queries. Queries are mapped into both English and Portuguese Wikipedia concepts. Experiments showed that Wikipedia coverage ratio of queries is inversely proportional to the query size. Wikipedia coverage of single English term query is about 81%, and 80% for single Portuguese term query. This ratio is decreased when the number of terms in query increased. However in the case of query translation, Wikipedia showed a comparative performance for (English – Portuguese) and (Portuguese – English) translation. In English – Portuguese translation, Wikipedia showed coverage ratio around 60% for single term queries, compared to 88% for Portuguese – English single term queries. The translation coverage ratio is also decreased when number of terms in query increase.

Research paper thumbnail of AIS MODEL FOR BOTNET DETECTION IN MANET USING FUZZY FUNCTION   By A.A.SALAMA

Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is... more Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is due to the lake of infrastructure and the continuous changing in the network topology. Botnets are believed to be the most harmful danger that threatens any type of networks; because it controls the units in a non noticeable manner so detection of botnets is more difficult . in this paper the Artificial Immune System (AIS) is used as the defense system to the MANET to face botnets.

Research paper thumbnail of Security in MANET based on PKI using fuzzy function

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this... more In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.

Research paper thumbnail of A Conceptual Model for Visual Monitorting Information System (VMIS) for the Strategic Plan

Strategic planning is most effective when implemented as an integral part of institutional decisi... more Strategic planning is most effective when implemented as an integral part of institutional decision-making, not as a separate formal, comprehensive activity. Measuring and managing performance is a challenging enterprise and seen as one of the keys to managing change and thus gaining competitive advantage in organizations. organizations need to assess and enhance their activities, in order to provide a monitoring the strategic planning , and to measure future capability as well as past performance. The efficiency of organization have given rise to new models and systems aimed at facilitating strategic decision making, primarily concerned with strategic planning assessment In this direction the design and adoption of a well-informed strategic management will increase the overall quality of those services. This paper suggests an information system for managing strategic planning that is highly quality-assured., by using of dynamic real-time visual representations in the strategy monitoring .AVMIS information system allows efficient decision making to be made at appropriate level of management. A prototypical web-based implementation is presented and discussed.

Research paper thumbnail of Some Intuitionistic Topological Notions of Intuitionistic Region, Possible Application to GIS Topological Rules

In Geographical information systems (GIS) there is a need to model spatial regions with intuition... more In Geographical information systems (GIS) there is a need to model spatial regions with intuitionistic boundary. In this paper, we generalize the topological ideals spaces to the notion of intuitionistic set; we construct the basic fundamental concepts and properties of an intuitionistic spatial region. In addition, we introduce the notion of ideals on intuitionistic set which is considered as a generalization of ideals studies in [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16]. The important topological intuitionistic ideal has been given. The concept of intuitionistic local function is also introduced for a intuitionistic topological space. These concepts are discussed with a view to find new intuitionistic topology from the original one. The basic structure, especially a basis for such generated intuitionistic topologies and several relations between different topological intuitionistic ideals are also studied here. Possible
application to GIS topology rules are touched upon.

Research paper thumbnail of Distances, Hesitancy Degree and Flexible Querying via Neutrosophic Sets

Since the world is full of indeterminacy, the neutrosophics found their place into contemporary r... more Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. İn this paper we, introduce the distances between neutrosophic sets: the Hamming distance, The normalized Hamming distance, the Euclidean distance and normalized Euclidean distance. We will extend the concepts of distances to the case of neutrosophic hesitancy degree. Added to, this paper suggest how to enrich intuitionistic fuzzy querying by the use of neutrosophic values..

Research paper thumbnail of DASHBOARD TECHNOLOGY BASED SOLUTION TO DECISION MAKING

The continuing development of DSS applications requires that new technologies be exploited to all... more The continuing development of DSS applications requires that new technologies be exploited to allow new classes of decision be supported. In most domains, problem-solving and decision-making are overwhelming because of the high volume of complicated data, the multiple complex relationships among data, the negotiability of the constraints, the changing environment, uncertainty and time pressure. Dashboard enables executives to measure, monitor and manage organization performance more effectively this paper proposes a framework for Dashboard DSS that integrates dashboard and Problem solving within enterprise functionality. Finally an DSS system for higher education planning is introduced to illustrate the application of the methodology and evaluate the using of dashboard as a decision making tools.

Research paper thumbnail of A Novel Model for Implementing Security over Mobile Ad-hoc Networks using Intuitionistic Fuzzy Function

Mobile adhoc network is a special kind of wireless networks. It is a collection of mobile nodes w... more Mobile adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile adhoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, Securing temporal networks like Mobile Ad-hoc Networks (MANETs) has been given a great amount of attention recently, though the process of creating a perfectly secured scheme has not been accomplished yet. MANETs has some other features and characteristics those are together make it a difficult environment to be secured. The bandwidth of MANET is another challenge because it is unlikely to consume the bandwidth in security mechanisms rather than data traffic. This paper proposes a security scheme based on Public Key infrastructure (PKI) for distributing session keys between nodes. The length of those keys is decided using intuitionistic fuzzy logic manipulation. The proposed algorithm of Security-model is an adaptive intuitionistic fuzzy logic based algorithm that can adapt itself according to the dynamic conditions of mobile hosts. Finally the Experimental results shows that the using of intuitionistic fuzzy based security can enhance the security of (MANETs).

Research paper thumbnail of AIS MODEL FOR BOTNET DETECTION IN MANET USING FUZZY FUNCTION

Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is... more Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is due to the lake of infrastructure and the continuous changing in the network topology. Botnets are believed to be the most harmful danger that threatens any type of networks; because it controls the units in a non noticeable manner so detection of botnets is more difficult . in this paper the Artificial Immune System (AIS) is used as the defense system to the MANET to face botnets. Experimental results show that the use of fuzzy based security can enhance the security of AIS in MANETs.

Research paper thumbnail of Security in MANET based on PKI using fuzzy function

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this... more In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.

Research paper thumbnail of Visual Model for Managing Educational Capacity Utilization in Egyptian Universities

The importance of quality service in Higher Education Institutions (HEI) has increased in ... more The importance of quality service in Higher

Education Institutions (HEI) has increased in recent years. Educational institutions need to assess and enhance their activities, in order to provide a balance of educational capacity and educational supply, and to measure future capability as well as past performance. In this direction the design and adoption of a well-informed strategic management will increase the overall quality of those services.

The number of students In Egyptian universities in each faculty varied from one to another depending on multi variables. No strategic planning to joined students. Academic workload management is concerned with distributing teaching resources in order to adequately support the university’s educational framework (faculties, degrees, courses, admission policies, teaching workload etc). The admissions process must admit students in such a manner as to achieve an efficient utilization of university resources.. This paper proposes a visual model for estimating educational capacity and planning its distribution and utilization in universities.

Research paper thumbnail of A Comparison of Several Performance Dashboards Architectures

A performance dashboard is a full-fledged business information system that is built on a business... more A performance dashboard is a full-fledged business information system that is built on a business-intelligence and dataintegration infrastructure. It has been one of the most hot research topics. Now many corporations have involved in the performance dashboard Architectures related techniques and many performance dashboard Architectures have been put forward. This is a favorable situation to study and application of performance dashboard related techniques. Though interesting, there are also some problems for so many Architectures forms. For to a novice or user with little knowledge about performance dashboard Architectures, it is still very hard to make a reasonable choice. What differences are there for different performance dashboard Architectures and what characteristics and advantages each has? To answer these problems, the characteristics, architectures and applications of several popular performance dashboard Architectures are analyzed and discussed in detail. From the comparison of these Architectures, users can better understand the different performance dashboard Architectures and more reasonably choose what they want.