Dr. Ashraf M M Aboshosha (original) (raw)

IJCSIS Papers by Dr. Ashraf M M Aboshosha

Research paper thumbnail of Analysis of Gain and NF using Raman and hybrid RFA-EDFA

Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2017

— In WDM networks, optical fibers are used and signals suffer from some loss due to attenuation, ... more — In WDM networks, optical fibers are used and signals suffer from some loss due to attenuation, which is the major limitation imposed by the transmission medium for long-distance. So, it is required to amplify all the light signals simultaneously after a certain interval of light propagation to return to its initial power. The aim of this paper is to analyze the performance of Raman amplifier only and different hybrid optical amplifiers (Raman-EDFA, EDFA-Raman). The configuration consists of 16 channels at speed of 10 Gbps. We have realized the different amplifiers and their parameters like gain, noise figure, BER, Q-factor. It is observed that EDFA-Raman showed good performance for get high gain, low noise figure (NF), high Q factor and bit error rate. Keywords—Raman, hybrid amplifier, Raman-EDFA, EDFA-Raman, optical gain, noise figure, bit error rate.

Research paper thumbnail of Multi-Channel User Authentication Protocol based on Encrypted Hidden OTP

Abstract — Remote user authentication plays the most fundamental procedure to identify the legiti... more Abstract — Remote user authentication plays the most fundamental procedure to identify the legitimate users of a
web service on the Internet. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Since, many researchers have proposed a number of password based authentication schemes which rely on a single channel for authentication. However to achieve a better security, it is possible to engage multi-channels for authenticating users. In this paper, we propose an efficient one time password (OTP) based authentication protocol over a multi-channels architecture. Where, the proposed protocol employing the RC4-EA encryption method to encrypt the plain-OTP to cipher-OTP. Then, Quick Response Code (QR) code is used as a data container to hide this cipher-OTP. Also, the purpose of the protocol is to integrate a web based application with mobile-based technology to communicate with the remote user over a multi-channels authentication scheme. The main advantage of the proposed protocol is to highly secure the authentication system by preventing the OTP from eavesdropping attack. Also, by integrating a Web-based application with mobile-based technology as a multi-channels scheme; the proposed protocol helps to overcome many challenging attacks such as replay attack, DoS attack, man-in-the-middle (MITM) attack, real-time phishing (RTP) and other malware attacks.

Keywords-Authentication; Multi-Channel Authentication (MCA); Data hiding; Quick Response Code (QR) code; Encryption.

Call for Papers:
https://sites.google.com/site/ijcsis/

IJCSIS Volumes by Dr. Ashraf M M Aboshosha

Research paper thumbnail of International Journal of Computer Science IJCSIS June 2015

The International Journal of Computer Science and Information Security (IJCSIS) is a refereed, in... more The International Journal of Computer Science and Information Security (IJCSIS) is a refereed, international publication featuring the latest research findings and industry solutions involving all aspects of computing and security. The editorial board is pleased to present the June 2015 issue. The purpose of this edition is to disseminate experimental and theoretical research from both industry and academia in the broad areas of Computer Science, ICT & Security and further bring together people who work in the relevant areas. As the editors of this issue, we are glad to see variety of articles focusing on the major topics of innovation and computer science; computer security, interdisciplinary applications, information technologies etc. This journal promotes excellent research publications which offer significant contribution to the computer science knowledge and which are of high interest to a wide academic/research/practitioner audience.
Over the last five years, we have witnessed significant growth of IJCSIS in several key areas, include the expansion of scope to recruit papers from emerging areas of green & sustainable computing, cloud computing security, forensics, mobile computing and big data analytics. IJCSIS archives all publications in major academic/scientific databases and is indexed by the following International agencies and institutions: Google Scholar, CiteSeerX, Cornell’s University Library, Ei Compendex, Scopus, DBLP, DOAJ, ProQuest, ArXiv, ResearchGate and EBSCO.
We are indebted to the wonderful team of publication staff members, associate editors, and reviewers for their dedicated services to select and publish extremely high quality papers for publication in IJCSIS. In particular, I would like to thank all associate editors who have answered the frequent calls to process the papers assigned to them in a timely fashion. I would also like to thank the authors for submitting their high quality papers to IJCSIS and the readers for continued support to IJCSIS by citing papers published in IJCSIS. Without their continued and unselfish commitments, IJCSIS would not have achieved its current premier status.
We support researchers to succeed by providing high visibility & impact value, prestige and efficient publication process & service.

For further questions please do not hesitate to contact us at ijcsiseditor@gmail.com.

A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 13, No. 6, June 2015 Edition
ISSN 1947-5500 © IJCSIS, USA.

Papers by Dr. Ashraf M M Aboshosha

Research paper thumbnail of Employing adaptive fuzzy computing for RCP intelligent control and fault diagnosis

Springer Nature, 2023

Loss of coolant accident (LOCA), loss of fluid accident (LOFA), and loss of vacuum accident (LOVA... more Loss of coolant accident (LOCA), loss of fluid accident (LOFA), and loss of vacuum accident (LOVA) are the most severe accidents that can occur in nuclear power reactors (NPRs). These accidents occur when the reactor loses its cooling media, leading to uncontrolled chain reactions akin to a nuclear bomb. This article is focused on exploring methods to prevent such accidents and ensure that the reactor cooling system remains fully controlled. The reactor coolant pump (RCP) has a pivotal role in facilitating heat exchange between the primary cycle, which is connected to the reactor core, and the secondary cycle associated with the steam generator. Furthermore, the RCP is integral to preventing catastrophic events such as LOCA, LOFA, and LOVA accidents. In this study, we discuss the most critical aspects related to the RCP, specifically focusing on RCP control and RCP fault diagnosis. The AI-based adaptive fuzzy method is used to regulate the RCP's speed and torque, whereas the neural fault diagnosis system (NFDS) is implemented for alarm signaling and fault diagnosis in nuclear reactors. To address the limitations of linguistic and statistical intelligence approaches, an integration of the statistical approach with fuzzy logic has been proposed. This integrated system leverages the strengths of both methods. Adaptive fuzzy control was applied to the VVER 1200 NPR-RCP induction motor, and the NFDS was implemented on the Kori-2 NPR-RCP.

Research paper thumbnail of IoT‑based data‑driven predictive maintenance relying on fuzzy system and artificial neural networks

Scientific Reports, 2023

Industry 4.0 technologies need to plan reactive and Preventive Maintenance (PM) strategies for th... more Industry 4.0 technologies need to plan reactive and Preventive Maintenance (PM) strategies for their production lines. This applied research study aims to employ the Predictive Maintenance (PdM)
technology with advanced automation technologies to counter all expected maintenance problems. Moreover, the deep learning based AI is employed to interpret the alarming patterns into real faults by which the system minimizes the human based fault recognition errors. The Sensors Information Modeling (SIM) and the Internet of Things (IoT) have the potential to improve the efficiency of industrial production machines maintenance management. This research work provides a better
maintenance strategy by utilizing a data-driven predictive maintenance planning framework based on our proposed SIM and IoT technologies. To verify the feasibility of our approach, the proposed framework is applied practically on a corrugated cardboard production factory in real industrial environment. The Fuzzy Logic System (FLS) is utilized to achieve the AI based PM while the Deep Learning (DL) is applied for the alarming and fault diagnosis in case the fault already occurred.

Research paper thumbnail of A framework for classifying breast cancer based on deep features integration and selection

Neural Computing and Applications

Deep convolutional neural networks (DCNNs) are one of the most advanced techniques for classifyin... more Deep convolutional neural networks (DCNNs) are one of the most advanced techniques for classifying images in a range of applications. One of the most prevalent cancers that cause death in women is breast cancer. For survival rates to increase, early detection and treatment of breast cancer is essential. Deep learning (DL) can help radiologists diagnose and classify breast cancer lesions. This paper proposes a computer-aided system based on DL techniques for automatically classify breast cancer tumors in histopathological images. There are nine DCNN architectures used in this work. Four schemes are performed in the proposed framework to find the best approach. The first scheme consists of pre-trained DCNNs based on the transfer learning concept. The second scheme performs feature extraction of the DCNN architectures and uses a support vector machine (SVM) classifier for evaluation. The third one performs feature integration to show how the integrated deep features may enhance the SVM...

Research paper thumbnail of Employing Multi-Level Authentication Protocol for Securing Intelligent Systems

Information Sciences Letters, 2016

Most authentication schemes are using passwords only to restrict access to services. Which are su... more Most authentication schemes are using passwords only to restrict access to services. Which are suffering from many weaknesses, such as key-logger attack and dictionary attack. Also, other authentication schemes are using physical token such as smart cards. These schemes are also impractical due to their infrastructure requirements. Since, many researchers have proposed a various of authentication schemes which rely on a single level security. So it is important to use multi-level security which is implemented especially in sensitive applications. This paper proposes an efficient multi-level user authentication protocol called "ElDahshan Authentication protocol" based on different authentication methods for each level. Where each level contains different authentication methods with its own privileges.These security levels are managed by an identity Manager. To validate the proposed protocol we applied it for user authentication on two web services such as Content Management System and Online Voting System.

Research paper thumbnail of Neurofuzzy Computing aided Fault Diagnosis of Nuclear Power Reactors

The International Conference on Electrical Engineering, 2010

Nuclear Power Reactors (NPRs) are large in scale and complex, so the information from local field... more Nuclear Power Reactors (NPRs) are large in scale and complex, so the information from local fields is excessive, and therefore plant operators cannot properly process it. When a plant malfunction occurs, there are data influxes, so the cause of the malfunction cannot be easily and promptly identified. A typical NPR may have around 2,000 alarms in the Main Control Room (MCR) in addition to the display of analog data [1-4]. During plant transients, mode changes and component trips, hundreds of alarms may be activated in a short time. Hence, to increase the plant safety, this article proposes the operator support systems based on neurofuzzy assisted alarming and diagnosis system. Throughout this framework the neurofuzzy fault diagnosis system is employed to fault diagnosis of nuclear reactors. To overcome the weak points of both linguistic and neuro learning based approaches an integration between the neural networks and fuzzy logic has been applied by which the integrated system will inherit the strengths of both approaches.

Research paper thumbnail of Analysis of Gain and NF using Raman and hybrid RFA-EDFA

3. Abstract-In WDM networks, optical fibers are used and signals suffer from some loss due to att... more 3. Abstract-In WDM networks, optical fibers are used and signals suffer from some loss due to attenuation, which is the major limitation imposed by the transmission medium for long-distance. So, it is required to amplify all the light signals simultaneously after a certain interval of light propagation to return to its initial power. The aim of this paper is to analyze the performance of Raman amplifier only and different hybrid optical amplifiers (Raman-EDFA, EDFA-Raman). The configuration consists of 16 channels at speed of 10 Gbps. We have realized the different amplifiers and their parameters like gain, noise figure, BER, Q-factor. It is observed that EDFA-Raman showed good performance for get high gain, low noise figure (NF), high Q factor and bit error rate. Keywords-Raman, hybrid amplifier, Raman-EDFA, EDFA-Raman, optical gain, noise figure, bit error rate.

Research paper thumbnail of Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing

Int. J. Netw. Secur., 2016

Most authentication schemes are using physical token such as smart cards to restrict services. Al... more Most authentication schemes are using physical token such as smart cards to restrict services. Although these schemes have been widely deployed for various kinds of daily applications; there are severe challenges regarding their infrastructure requirements and security. This paper proposes an efficient authentication protocol based on user's machine-metrics. The proposed protocol uses the machine physical metrics to identify machines in the network, which provides the basic capability to prevent an unauthorized machine to access resources. Thus, machine-merics based authentication for machine can be looked as an analog of biometric-based authentication for human. The proposed protocol is employing the RC4-EA Hashing function to secure the collected machine-merics. Since it is satisfying the basic requirements of a cryptographic hash function. Therefore, the purpose of the proposed protocol is theft-proofing and guarding against attacks based on stolen or lost tokens. Also, it of...

Research paper thumbnail of Simulation Based Energy Consumption Optimization for Buildings by Using Various Energy Saving Methods

Advances in Science, Technology and Engineering Systems Journal, 2020

The world has turned in the modern era to reduce peak times for electricity consumption, where th... more The world has turned in the modern era to reduce peak times for electricity consumption, where the peak times cause excessive load on the electricity grid and power stations. In Egypt air conditioning loads are considered the main contributing reasons for the peak time's problem due to presence of large unshaded glazed surfaces, which cause high thermal loads inside the buildings. In this study, various methods of energy rationalization in buildings are evaluated by using many scenarios, from the obtained results of this research study. It is found that the use of shading on windows is an effective strategy where the percentage of rationalization using scenarios integration reached 40%, and the financial returns have also been calculated based on this work.

Research paper thumbnail of Active and Passive Self-Interference Cancellation Techniques for Full-Duplex Systems in the Next Generation (5G) of Mobile Communication Networks

Advances in Networks, 2017

Fifth Generation of cellular networks is coming in the next few years and we think that it will n... more Fifth Generation of cellular networks is coming in the next few years and we think that it will not be predicted as a development version of the existing one. The wireless research community aspires to visualize full duplex operation by supporting concurrent transmission and reception in a single time/frequency channel for the sake of improving the attainable spectral efficiency by a Factor of two as compared to the family of conventional half duplex wireless systems. The main challenge encountered in implementing full duplex wireless devices is that of finding techniques for mitigating the performance degradation caused by self-interference. Self-interference suppression will represent one of the main merits that offered by the Fifth Generation Networks. While in the existing version of mobile networks the available spectrum is not sufficiently used, the predicted version will use that spectrum in more efficient manner in such a way that it will be approximately full all the operating time. The object of this paper is to scan the existing techniques that are concerned with Self Interference cancellation on the level of antenna and system design to allow us to suggest some solutions for that problem in the future.

Research paper thumbnail of Feature selection for face authentication systems: feature space reductionism and QPSO

International Journal of Biometrics, 2019

Research paper thumbnail of EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS

RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic in... more RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic information. How- ever, RC4 encryption algorithm su�ers from a secret key generation as a seed problems. This paper proposes an intelligent dynamic secret key generation as a seed by em- ploying an Evolutionary Algorithm (EA). The proposed RC4-EA method tends to enhance the RC4 encryption algorithm with a high degree of a seed key randomness. The main advantage of the proposed RC4-EA method is that the generation of this secret key is done dynamically and randomly; this adds more strength of the RC4 en- cryption algorithm against breaking this cryptosystems. Several experiments on the proposed RC4-EA method are conducted. Where, the results of the experiments show the improvement of the encryption time and the through- put of the proposed encryption RC4-EA method. Also, the proposed validated RC4-EA encryption method is ap- plied for data ciphering in Content Management System (CMS).

Research paper thumbnail of Computer-Aided Design and Simulation-based Efficiency Improvement of the First Egyptian Solar City

2021 22nd International Middle East Power Systems Conference (MEPCON), Assiut University, Egypt, 2021

This article proposes a design of the world's first complete solar city, where this city produces... more This article proposes a design of the world's first complete solar city, where this city produces more energy than what it consumes. The architecture design of the city is accomplished by Sketchup software which was used to design buildings and facilities within this city integrated with Skelion solar design plugin renewable energy extension. The PVsyst Solar Energy Software is used to simulate and analyze the generated electric solar power of the world's first solar city. Matlab/Simulink simulation is used to study the efficiency of the Solar Photovoltaic (PV) system under different climates in Egypt. Also, Lumion software is used for rendering and 3D animation of the solar city in live scenarios. The main contribution of this research work is to produce electricity that exceeds the consumption of the residents of this solar city or what is called the over-unity system.

Research paper thumbnail of Feature selection for face authentication systems: feature space reductionism and QPSO

In face authentication systems, the feature selection (FS) process is very important because any ... more In face authentication systems, the feature selection (FS) process is very important because any feature extractor introduces some irrelevant or noisy features. These features can affect in the performance of such systems. In this paper, a new method is proposed to reduce the computations time in the facial feature selection. Quantum Fourier transforms (QFT), discrete wavelet transform (DWT). Discrete cosine transform (DCT) and scale invariant feature transform (SIFT) are employed separately as features' extractors. The proposed algorithm denoted by FSR_QPSO has two phases: feature space reductionism (FSR) and optimal feature selection based on quantum particle swarm optimisation (QPSO). FSR reduces the size of the feature matrix by selecting the best vectors (rows) and rejects the worst. Then QPSO is applied to fetch the optimal features set over the reduced space that contains the best vectors only. The proposed algorithm has been tested on ORL and Face94 databases. The experimental results show that the proposed algorithm reduces feature selection time against the case of using complete feature space.

Research paper thumbnail of Graphics, Vision and Image Processing Journal, ISSN 1687-398X, Volume 17, Issue 2, Delaware, USA

This issue (DOI: 10.13140/RG.2.2.13132.92807) includes the following articles; P1151705543, autho... more This issue (DOI: 10.13140/RG.2.2.13132.92807) includes the following articles; P1151705543, author="Tieling Chen", title="Detail Preserving Sorted Difference Filter", P1151738585, author="Vladimir A. Kulyukin", title="GreedyHaarSpiker: An Algorithm for In Situ Detection of Highway Lane Boundaries with 1D Haar Wavelet Spikes", P1151714561, author="Poorva Waingankar and Sangeeta Joshi", title="Video Compression using Efficient Encoding Techniques for Low Bit Rate Applications", P1151733581, author="Ayush Purohit and Shardul Singh Chauhan", title="A Precise Technique for Hand Gesture Recognition", P1151748594, author="D. Boopathy and M. Sundaresan", title="Securing Images on Cloud using Multidimensional Approach", P1151747592, author="M. Anyayahan and M. Balinas and A. La Madrid and M. Laurel and C. Lopez and R. Tolentino", title="Rotational invariant Real Time Text Recognition",

Research paper thumbnail of Automatic Control and System Engineering Journal, Volume 17, Issue 2, ISSN 1687-4811, ICGST LLC, Delaware, USA

This issue (DOI: 10.13140/RG.2.2.23618.68804) includes the following articles; P1130945914, autho... more This issue (DOI: 10.13140/RG.2.2.23618.68804) includes the following articles; P1130945914, author="Alaa Sheta and Mohammad Salamah", title="An Innovative NXT Mobile Robot System for Landmine Detection", P1111733578, author="Prof. Dr. Kamen M. Yanev", title="Advanced D-Partitioning Stability Analysis of Digital Control Systems with Multivariable Parameters", P1111748593, author="Ali Alqudaihiand Mohamed Zohdy and Hoda Abdel-Aty-Zohdy", title="Multi-Sensor Fusion Indoor Security Based on Interval Probability, Extended Kalman Filter and Fuzzy Rules Pruning", P1111744588, author="Kamal ElDahshan and Afaf Abd Elkader and Nermeen Ghazy", title="Round Robin based Scheduling Algorithms, A Comparative Study"

Research paper thumbnail of Moment Based Spectrum Sensing Algorithm in Cognitive Radio Network for Future of 5G

The cognitive radio is a smart wireless communication system that is aware of its adjacent enviro... more The cognitive radio is a smart wireless communication system that is aware of its adjacent environment and under a certain approach is capable of using the current available spectrum temporarily without interfering with the primary user. Cyclostationary detection, which exploits the periodic property of communication signal statistics, absent in stationary noise, is a natural candidate for this setting. The proposed work compromises simple moment based spectrum sensing algorithm for cognitive radio networks. It is made-up that the transmitted signal samples are binary (quadrature) phase-shift keying BPSK (QPSK), Mary quadrature amplitude modulation (QAM) or continuous uniformly distributed random variables and the noise samples are independent and identically distributed circularly symmetric complex Gaussian random variables all with unknown (inadequate) variance. Based on these assumptions, the proposed work offer a simple test statistics engaging a ratio of second and fourth moments. For this statistics, suggested work will deliver analytical expressions for both probability of false alarm and probability of detection in an additive white Gaussian noise (AWGN) channel. Here, will approve the theoretical expressions through simulation program. In addition, under noise variance uncertainty, simulation results decide that the suggested moment based detector provides better detection performance compared to that of energy detector in AWGN and Rayleigh fading channels.

Research paper thumbnail of APPLYING QUANTUM ALGORITHMS FOR ENHANCING FACE AUTHENTICATION

APPLYING QUANTUM ALGORITHMS FOR ENHANCING FACE AUTHENTICAION APPLYING QUANTUM ALGORITHMS FOR ENHANCING FACE AUTHENTICATION, 2017

Coupling Biometrics with Quantum algorithms offers a new range of security. In this paper, we giv... more Coupling Biometrics with Quantum algorithms offers a new range of security. In this paper, we give a brief overview of the field of biometrics specially face authentication. Also, we propose a quantum face authentication method. The proposed method phases are detection face boundaries, image resizing, remove noisy, feature extraction, matching and decision. In addition, the proposed method uses QFWT (Quantum Fast Wavelet Transform) and QFT (Quantum Fourier Transform) in extraction phase.

Research paper thumbnail of Analysis of Gain and NF using Raman and hybrid RFA-EDFA

Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2017

— In WDM networks, optical fibers are used and signals suffer from some loss due to attenuation, ... more — In WDM networks, optical fibers are used and signals suffer from some loss due to attenuation, which is the major limitation imposed by the transmission medium for long-distance. So, it is required to amplify all the light signals simultaneously after a certain interval of light propagation to return to its initial power. The aim of this paper is to analyze the performance of Raman amplifier only and different hybrid optical amplifiers (Raman-EDFA, EDFA-Raman). The configuration consists of 16 channels at speed of 10 Gbps. We have realized the different amplifiers and their parameters like gain, noise figure, BER, Q-factor. It is observed that EDFA-Raman showed good performance for get high gain, low noise figure (NF), high Q factor and bit error rate. Keywords—Raman, hybrid amplifier, Raman-EDFA, EDFA-Raman, optical gain, noise figure, bit error rate.

Research paper thumbnail of Multi-Channel User Authentication Protocol based on Encrypted Hidden OTP

Abstract — Remote user authentication plays the most fundamental procedure to identify the legiti... more Abstract — Remote user authentication plays the most fundamental procedure to identify the legitimate users of a
web service on the Internet. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Since, many researchers have proposed a number of password based authentication schemes which rely on a single channel for authentication. However to achieve a better security, it is possible to engage multi-channels for authenticating users. In this paper, we propose an efficient one time password (OTP) based authentication protocol over a multi-channels architecture. Where, the proposed protocol employing the RC4-EA encryption method to encrypt the plain-OTP to cipher-OTP. Then, Quick Response Code (QR) code is used as a data container to hide this cipher-OTP. Also, the purpose of the protocol is to integrate a web based application with mobile-based technology to communicate with the remote user over a multi-channels authentication scheme. The main advantage of the proposed protocol is to highly secure the authentication system by preventing the OTP from eavesdropping attack. Also, by integrating a Web-based application with mobile-based technology as a multi-channels scheme; the proposed protocol helps to overcome many challenging attacks such as replay attack, DoS attack, man-in-the-middle (MITM) attack, real-time phishing (RTP) and other malware attacks.

Keywords-Authentication; Multi-Channel Authentication (MCA); Data hiding; Quick Response Code (QR) code; Encryption.

Call for Papers:
https://sites.google.com/site/ijcsis/

Research paper thumbnail of International Journal of Computer Science IJCSIS June 2015

The International Journal of Computer Science and Information Security (IJCSIS) is a refereed, in... more The International Journal of Computer Science and Information Security (IJCSIS) is a refereed, international publication featuring the latest research findings and industry solutions involving all aspects of computing and security. The editorial board is pleased to present the June 2015 issue. The purpose of this edition is to disseminate experimental and theoretical research from both industry and academia in the broad areas of Computer Science, ICT & Security and further bring together people who work in the relevant areas. As the editors of this issue, we are glad to see variety of articles focusing on the major topics of innovation and computer science; computer security, interdisciplinary applications, information technologies etc. This journal promotes excellent research publications which offer significant contribution to the computer science knowledge and which are of high interest to a wide academic/research/practitioner audience.
Over the last five years, we have witnessed significant growth of IJCSIS in several key areas, include the expansion of scope to recruit papers from emerging areas of green & sustainable computing, cloud computing security, forensics, mobile computing and big data analytics. IJCSIS archives all publications in major academic/scientific databases and is indexed by the following International agencies and institutions: Google Scholar, CiteSeerX, Cornell’s University Library, Ei Compendex, Scopus, DBLP, DOAJ, ProQuest, ArXiv, ResearchGate and EBSCO.
We are indebted to the wonderful team of publication staff members, associate editors, and reviewers for their dedicated services to select and publish extremely high quality papers for publication in IJCSIS. In particular, I would like to thank all associate editors who have answered the frequent calls to process the papers assigned to them in a timely fashion. I would also like to thank the authors for submitting their high quality papers to IJCSIS and the readers for continued support to IJCSIS by citing papers published in IJCSIS. Without their continued and unselfish commitments, IJCSIS would not have achieved its current premier status.
We support researchers to succeed by providing high visibility & impact value, prestige and efficient publication process & service.

For further questions please do not hesitate to contact us at ijcsiseditor@gmail.com.

A complete list of journals can be found at:
http://sites.google.com/site/ijcsis/
IJCSIS Vol. 13, No. 6, June 2015 Edition
ISSN 1947-5500 © IJCSIS, USA.

Research paper thumbnail of Employing adaptive fuzzy computing for RCP intelligent control and fault diagnosis

Springer Nature, 2023

Loss of coolant accident (LOCA), loss of fluid accident (LOFA), and loss of vacuum accident (LOVA... more Loss of coolant accident (LOCA), loss of fluid accident (LOFA), and loss of vacuum accident (LOVA) are the most severe accidents that can occur in nuclear power reactors (NPRs). These accidents occur when the reactor loses its cooling media, leading to uncontrolled chain reactions akin to a nuclear bomb. This article is focused on exploring methods to prevent such accidents and ensure that the reactor cooling system remains fully controlled. The reactor coolant pump (RCP) has a pivotal role in facilitating heat exchange between the primary cycle, which is connected to the reactor core, and the secondary cycle associated with the steam generator. Furthermore, the RCP is integral to preventing catastrophic events such as LOCA, LOFA, and LOVA accidents. In this study, we discuss the most critical aspects related to the RCP, specifically focusing on RCP control and RCP fault diagnosis. The AI-based adaptive fuzzy method is used to regulate the RCP's speed and torque, whereas the neural fault diagnosis system (NFDS) is implemented for alarm signaling and fault diagnosis in nuclear reactors. To address the limitations of linguistic and statistical intelligence approaches, an integration of the statistical approach with fuzzy logic has been proposed. This integrated system leverages the strengths of both methods. Adaptive fuzzy control was applied to the VVER 1200 NPR-RCP induction motor, and the NFDS was implemented on the Kori-2 NPR-RCP.

Research paper thumbnail of IoT‑based data‑driven predictive maintenance relying on fuzzy system and artificial neural networks

Scientific Reports, 2023

Industry 4.0 technologies need to plan reactive and Preventive Maintenance (PM) strategies for th... more Industry 4.0 technologies need to plan reactive and Preventive Maintenance (PM) strategies for their production lines. This applied research study aims to employ the Predictive Maintenance (PdM)
technology with advanced automation technologies to counter all expected maintenance problems. Moreover, the deep learning based AI is employed to interpret the alarming patterns into real faults by which the system minimizes the human based fault recognition errors. The Sensors Information Modeling (SIM) and the Internet of Things (IoT) have the potential to improve the efficiency of industrial production machines maintenance management. This research work provides a better
maintenance strategy by utilizing a data-driven predictive maintenance planning framework based on our proposed SIM and IoT technologies. To verify the feasibility of our approach, the proposed framework is applied practically on a corrugated cardboard production factory in real industrial environment. The Fuzzy Logic System (FLS) is utilized to achieve the AI based PM while the Deep Learning (DL) is applied for the alarming and fault diagnosis in case the fault already occurred.

Research paper thumbnail of A framework for classifying breast cancer based on deep features integration and selection

Neural Computing and Applications

Deep convolutional neural networks (DCNNs) are one of the most advanced techniques for classifyin... more Deep convolutional neural networks (DCNNs) are one of the most advanced techniques for classifying images in a range of applications. One of the most prevalent cancers that cause death in women is breast cancer. For survival rates to increase, early detection and treatment of breast cancer is essential. Deep learning (DL) can help radiologists diagnose and classify breast cancer lesions. This paper proposes a computer-aided system based on DL techniques for automatically classify breast cancer tumors in histopathological images. There are nine DCNN architectures used in this work. Four schemes are performed in the proposed framework to find the best approach. The first scheme consists of pre-trained DCNNs based on the transfer learning concept. The second scheme performs feature extraction of the DCNN architectures and uses a support vector machine (SVM) classifier for evaluation. The third one performs feature integration to show how the integrated deep features may enhance the SVM...

Research paper thumbnail of Employing Multi-Level Authentication Protocol for Securing Intelligent Systems

Information Sciences Letters, 2016

Most authentication schemes are using passwords only to restrict access to services. Which are su... more Most authentication schemes are using passwords only to restrict access to services. Which are suffering from many weaknesses, such as key-logger attack and dictionary attack. Also, other authentication schemes are using physical token such as smart cards. These schemes are also impractical due to their infrastructure requirements. Since, many researchers have proposed a various of authentication schemes which rely on a single level security. So it is important to use multi-level security which is implemented especially in sensitive applications. This paper proposes an efficient multi-level user authentication protocol called "ElDahshan Authentication protocol" based on different authentication methods for each level. Where each level contains different authentication methods with its own privileges.These security levels are managed by an identity Manager. To validate the proposed protocol we applied it for user authentication on two web services such as Content Management System and Online Voting System.

Research paper thumbnail of Neurofuzzy Computing aided Fault Diagnosis of Nuclear Power Reactors

The International Conference on Electrical Engineering, 2010

Nuclear Power Reactors (NPRs) are large in scale and complex, so the information from local field... more Nuclear Power Reactors (NPRs) are large in scale and complex, so the information from local fields is excessive, and therefore plant operators cannot properly process it. When a plant malfunction occurs, there are data influxes, so the cause of the malfunction cannot be easily and promptly identified. A typical NPR may have around 2,000 alarms in the Main Control Room (MCR) in addition to the display of analog data [1-4]. During plant transients, mode changes and component trips, hundreds of alarms may be activated in a short time. Hence, to increase the plant safety, this article proposes the operator support systems based on neurofuzzy assisted alarming and diagnosis system. Throughout this framework the neurofuzzy fault diagnosis system is employed to fault diagnosis of nuclear reactors. To overcome the weak points of both linguistic and neuro learning based approaches an integration between the neural networks and fuzzy logic has been applied by which the integrated system will inherit the strengths of both approaches.

Research paper thumbnail of Analysis of Gain and NF using Raman and hybrid RFA-EDFA

3. Abstract-In WDM networks, optical fibers are used and signals suffer from some loss due to att... more 3. Abstract-In WDM networks, optical fibers are used and signals suffer from some loss due to attenuation, which is the major limitation imposed by the transmission medium for long-distance. So, it is required to amplify all the light signals simultaneously after a certain interval of light propagation to return to its initial power. The aim of this paper is to analyze the performance of Raman amplifier only and different hybrid optical amplifiers (Raman-EDFA, EDFA-Raman). The configuration consists of 16 channels at speed of 10 Gbps. We have realized the different amplifiers and their parameters like gain, noise figure, BER, Q-factor. It is observed that EDFA-Raman showed good performance for get high gain, low noise figure (NF), high Q factor and bit error rate. Keywords-Raman, hybrid amplifier, Raman-EDFA, EDFA-Raman, optical gain, noise figure, bit error rate.

Research paper thumbnail of Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing

Int. J. Netw. Secur., 2016

Most authentication schemes are using physical token such as smart cards to restrict services. Al... more Most authentication schemes are using physical token such as smart cards to restrict services. Although these schemes have been widely deployed for various kinds of daily applications; there are severe challenges regarding their infrastructure requirements and security. This paper proposes an efficient authentication protocol based on user's machine-metrics. The proposed protocol uses the machine physical metrics to identify machines in the network, which provides the basic capability to prevent an unauthorized machine to access resources. Thus, machine-merics based authentication for machine can be looked as an analog of biometric-based authentication for human. The proposed protocol is employing the RC4-EA Hashing function to secure the collected machine-merics. Since it is satisfying the basic requirements of a cryptographic hash function. Therefore, the purpose of the proposed protocol is theft-proofing and guarding against attacks based on stolen or lost tokens. Also, it of...

Research paper thumbnail of Simulation Based Energy Consumption Optimization for Buildings by Using Various Energy Saving Methods

Advances in Science, Technology and Engineering Systems Journal, 2020

The world has turned in the modern era to reduce peak times for electricity consumption, where th... more The world has turned in the modern era to reduce peak times for electricity consumption, where the peak times cause excessive load on the electricity grid and power stations. In Egypt air conditioning loads are considered the main contributing reasons for the peak time's problem due to presence of large unshaded glazed surfaces, which cause high thermal loads inside the buildings. In this study, various methods of energy rationalization in buildings are evaluated by using many scenarios, from the obtained results of this research study. It is found that the use of shading on windows is an effective strategy where the percentage of rationalization using scenarios integration reached 40%, and the financial returns have also been calculated based on this work.

Research paper thumbnail of Active and Passive Self-Interference Cancellation Techniques for Full-Duplex Systems in the Next Generation (5G) of Mobile Communication Networks

Advances in Networks, 2017

Fifth Generation of cellular networks is coming in the next few years and we think that it will n... more Fifth Generation of cellular networks is coming in the next few years and we think that it will not be predicted as a development version of the existing one. The wireless research community aspires to visualize full duplex operation by supporting concurrent transmission and reception in a single time/frequency channel for the sake of improving the attainable spectral efficiency by a Factor of two as compared to the family of conventional half duplex wireless systems. The main challenge encountered in implementing full duplex wireless devices is that of finding techniques for mitigating the performance degradation caused by self-interference. Self-interference suppression will represent one of the main merits that offered by the Fifth Generation Networks. While in the existing version of mobile networks the available spectrum is not sufficiently used, the predicted version will use that spectrum in more efficient manner in such a way that it will be approximately full all the operating time. The object of this paper is to scan the existing techniques that are concerned with Self Interference cancellation on the level of antenna and system design to allow us to suggest some solutions for that problem in the future.

Research paper thumbnail of Feature selection for face authentication systems: feature space reductionism and QPSO

International Journal of Biometrics, 2019

Research paper thumbnail of EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS

RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic in... more RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic information. How- ever, RC4 encryption algorithm su�ers from a secret key generation as a seed problems. This paper proposes an intelligent dynamic secret key generation as a seed by em- ploying an Evolutionary Algorithm (EA). The proposed RC4-EA method tends to enhance the RC4 encryption algorithm with a high degree of a seed key randomness. The main advantage of the proposed RC4-EA method is that the generation of this secret key is done dynamically and randomly; this adds more strength of the RC4 en- cryption algorithm against breaking this cryptosystems. Several experiments on the proposed RC4-EA method are conducted. Where, the results of the experiments show the improvement of the encryption time and the through- put of the proposed encryption RC4-EA method. Also, the proposed validated RC4-EA encryption method is ap- plied for data ciphering in Content Management System (CMS).

Research paper thumbnail of Computer-Aided Design and Simulation-based Efficiency Improvement of the First Egyptian Solar City

2021 22nd International Middle East Power Systems Conference (MEPCON), Assiut University, Egypt, 2021

This article proposes a design of the world's first complete solar city, where this city produces... more This article proposes a design of the world's first complete solar city, where this city produces more energy than what it consumes. The architecture design of the city is accomplished by Sketchup software which was used to design buildings and facilities within this city integrated with Skelion solar design plugin renewable energy extension. The PVsyst Solar Energy Software is used to simulate and analyze the generated electric solar power of the world's first solar city. Matlab/Simulink simulation is used to study the efficiency of the Solar Photovoltaic (PV) system under different climates in Egypt. Also, Lumion software is used for rendering and 3D animation of the solar city in live scenarios. The main contribution of this research work is to produce electricity that exceeds the consumption of the residents of this solar city or what is called the over-unity system.

Research paper thumbnail of Feature selection for face authentication systems: feature space reductionism and QPSO

In face authentication systems, the feature selection (FS) process is very important because any ... more In face authentication systems, the feature selection (FS) process is very important because any feature extractor introduces some irrelevant or noisy features. These features can affect in the performance of such systems. In this paper, a new method is proposed to reduce the computations time in the facial feature selection. Quantum Fourier transforms (QFT), discrete wavelet transform (DWT). Discrete cosine transform (DCT) and scale invariant feature transform (SIFT) are employed separately as features' extractors. The proposed algorithm denoted by FSR_QPSO has two phases: feature space reductionism (FSR) and optimal feature selection based on quantum particle swarm optimisation (QPSO). FSR reduces the size of the feature matrix by selecting the best vectors (rows) and rejects the worst. Then QPSO is applied to fetch the optimal features set over the reduced space that contains the best vectors only. The proposed algorithm has been tested on ORL and Face94 databases. The experimental results show that the proposed algorithm reduces feature selection time against the case of using complete feature space.

Research paper thumbnail of Graphics, Vision and Image Processing Journal, ISSN 1687-398X, Volume 17, Issue 2, Delaware, USA

This issue (DOI: 10.13140/RG.2.2.13132.92807) includes the following articles; P1151705543, autho... more This issue (DOI: 10.13140/RG.2.2.13132.92807) includes the following articles; P1151705543, author="Tieling Chen", title="Detail Preserving Sorted Difference Filter", P1151738585, author="Vladimir A. Kulyukin", title="GreedyHaarSpiker: An Algorithm for In Situ Detection of Highway Lane Boundaries with 1D Haar Wavelet Spikes", P1151714561, author="Poorva Waingankar and Sangeeta Joshi", title="Video Compression using Efficient Encoding Techniques for Low Bit Rate Applications", P1151733581, author="Ayush Purohit and Shardul Singh Chauhan", title="A Precise Technique for Hand Gesture Recognition", P1151748594, author="D. Boopathy and M. Sundaresan", title="Securing Images on Cloud using Multidimensional Approach", P1151747592, author="M. Anyayahan and M. Balinas and A. La Madrid and M. Laurel and C. Lopez and R. Tolentino", title="Rotational invariant Real Time Text Recognition",

Research paper thumbnail of Automatic Control and System Engineering Journal, Volume 17, Issue 2, ISSN 1687-4811, ICGST LLC, Delaware, USA

This issue (DOI: 10.13140/RG.2.2.23618.68804) includes the following articles; P1130945914, autho... more This issue (DOI: 10.13140/RG.2.2.23618.68804) includes the following articles; P1130945914, author="Alaa Sheta and Mohammad Salamah", title="An Innovative NXT Mobile Robot System for Landmine Detection", P1111733578, author="Prof. Dr. Kamen M. Yanev", title="Advanced D-Partitioning Stability Analysis of Digital Control Systems with Multivariable Parameters", P1111748593, author="Ali Alqudaihiand Mohamed Zohdy and Hoda Abdel-Aty-Zohdy", title="Multi-Sensor Fusion Indoor Security Based on Interval Probability, Extended Kalman Filter and Fuzzy Rules Pruning", P1111744588, author="Kamal ElDahshan and Afaf Abd Elkader and Nermeen Ghazy", title="Round Robin based Scheduling Algorithms, A Comparative Study"

Research paper thumbnail of Moment Based Spectrum Sensing Algorithm in Cognitive Radio Network for Future of 5G

The cognitive radio is a smart wireless communication system that is aware of its adjacent enviro... more The cognitive radio is a smart wireless communication system that is aware of its adjacent environment and under a certain approach is capable of using the current available spectrum temporarily without interfering with the primary user. Cyclostationary detection, which exploits the periodic property of communication signal statistics, absent in stationary noise, is a natural candidate for this setting. The proposed work compromises simple moment based spectrum sensing algorithm for cognitive radio networks. It is made-up that the transmitted signal samples are binary (quadrature) phase-shift keying BPSK (QPSK), Mary quadrature amplitude modulation (QAM) or continuous uniformly distributed random variables and the noise samples are independent and identically distributed circularly symmetric complex Gaussian random variables all with unknown (inadequate) variance. Based on these assumptions, the proposed work offer a simple test statistics engaging a ratio of second and fourth moments. For this statistics, suggested work will deliver analytical expressions for both probability of false alarm and probability of detection in an additive white Gaussian noise (AWGN) channel. Here, will approve the theoretical expressions through simulation program. In addition, under noise variance uncertainty, simulation results decide that the suggested moment based detector provides better detection performance compared to that of energy detector in AWGN and Rayleigh fading channels.

Research paper thumbnail of APPLYING QUANTUM ALGORITHMS FOR ENHANCING FACE AUTHENTICATION

APPLYING QUANTUM ALGORITHMS FOR ENHANCING FACE AUTHENTICAION APPLYING QUANTUM ALGORITHMS FOR ENHANCING FACE AUTHENTICATION, 2017

Coupling Biometrics with Quantum algorithms offers a new range of security. In this paper, we giv... more Coupling Biometrics with Quantum algorithms offers a new range of security. In this paper, we give a brief overview of the field of biometrics specially face authentication. Also, we propose a quantum face authentication method. The proposed method phases are detection face boundaries, image resizing, remove noisy, feature extraction, matching and decision. In addition, the proposed method uses QFWT (Quantum Fast Wavelet Transform) and QFT (Quantum Fourier Transform) in extraction phase.

Research paper thumbnail of Active and Passive Self-Interference Cancellation Techniques for Full-Duplex Systems in the Next Generation (5G) of Mobile Communication Networks

Fifth Generation of cellular networks is coming in the next few years and we think that it will n... more Fifth Generation of cellular networks is coming in the next few years and we think that it will not be predicted as a development version of the existing one. The wireless research community aspires to visualize full duplex operation by supporting concurrent transmission and reception in a single time/frequency channel for the sake of improving the attainable spectral efficiency by a Factor of two as compared to the family of conventional half duplex wireless systems. The main challenge encountered in implementing full duplex wireless devices is that of finding techniques for mitigating the performance degradation caused by self-interference. Self-interference suppression will represent one of the main merits that offered by the Fifth Generation Networks. While in the existing version of mobile networks the available spectrum is not sufficiently used, the predicted version will use that spectrum in more efficient manner in such a way that it will be approximately full all the operating time. The object of this paper is to scan the existing techniques that are concerned with Self Interference cancellation on the level of antenna and system design to allow us to suggest some solutions for that problem in the future.

Research paper thumbnail of Graphics, Vision and Image Processing Journal, ISSN 1687-398X, Volume 17, Issue 1

This issue (DOI: 10.13140/RG.2.2.22725.55521) includes the following papers; P1151653533, sameh m... more This issue (DOI: 10.13140/RG.2.2.22725.55521) includes the following papers; P1151653533, sameh magdy and Mohamed Ibrahim and tarek mahmoud, "Face Recognition based on Hidden Markov Model and Canny Operators" P1151711551, Arcangel R. and Capuso S. and Gerbuyos M. and Laviña C. and Mabuti G. and Tolentino R., "Robust Mouse Control based on Dynamic Template Matching of Hand Gestures” P1151712554, D. Barrinuevo and G. Jacosalem and J. N. Lagahit and M. J. Lobedica and M. R. Salar and R. Tolentino, "Precise Obstacles Avoidance System for Visually Impaired People using Xbox 360 Kinect" P1151712556, Vladimir A. Kulyukin and Sarbajit Mukherjee, "Computer Vision in Electronic Beehive Monitoring: In Situ Vision-Based Bee Counting on Langstroth Hive Landing Pads"

Research paper thumbnail of Artificial Intelligence and Machine Learning Journal, ISSN 1687-4846, Volume 17, Issue 1

This issue includes the following papers; P1121653529, AUTHOR="Sameh Magdy and Tarek Mahmoud and... more This issue includes the following papers;
P1121653529,
AUTHOR="Sameh Magdy and Tarek Mahmoud and Mohamed Ibrahim",
TITLE="Improved Face Recognition based on Hidden Markov Model"

P1121705544,
AUTHOR="Afaf Abd Elkader Abd Elhafiz",
TITLE="Enhancing the Minimum Average Scheduling Algorithm (MASA) based on Makespan Minimizing",

P1121711553,
AUTHOR="Jimdelle C. Kintanar and Russel Roman L. Mallari and Jasmin D. Maullon and Ma. Camille H. Ragual and Julius M. Redilla and Roselito E. Tolentino"

P1121713558,
AUTHOR="Ammar Mohammed and Mohammed Karam and Hesham Hefny",
TITLE="GA-based Parameter Optimization for Word Segmentation"

P1121716566,
AUTHOR="Prof. Kamal ElDahshan and Khalid Walid and Mennatullah Walid and Mohamed Ali ",
TITLE="Automatic Conversion of Natural Language into Relational Database Queries"

Research paper thumbnail of العناصر الإلكترونية  Electronic Devices

Noor Publishing, 2020

ويطلق ،: Electronic engineering هندسة الإلكترونيات أو الهندسة الإلكترونية بالإنجليزية هي فرع : co... more ويطلق ،: Electronic engineering هندسة الإلكترونيات أو الهندسة الإلكترونية بالإنجليزية هي فرع : communications engineering عليها أيضا اسم هندسة الاتصالات بالإنجليزية الهندسة الكهربائية الذي يتعامل مع المكونات الكهربية الفعالة غير الخطيّة )مثل أشباه الموصلات خاصة الترانزستور والدايود والدوائر المتكاملة( بغرض تصميم الدوائر الالكترونية، الأجهزة، المعالجات الدقيقة، المتحكمات الدقيقة والأنظمة الإلكترونية. كما تعنى هندسة الإلكترونيات بتصميم المكونات الالكترونية الغير فعالة، عادة بالاعتماد على لوحة الدارات المطبوعة. ت عتبر هندسة الإلكترونيات فرع من الأصل الأكاديمي الأكبر الهندسة الكهربائية، لكنها تشمل مجال هندسي أوسع، يغطي العديد من المجالات الفرعية مثل الإلكترونيات التناظرية، الإلكترونيات الرقمية، الأنظمة المضمنة، الإلكترونيات الاستهلاكية والالكترونيات الصناعية. تهتم هندسة الإلكترونيات بتنفيذ المبادئ والتطبيقات والخوارزميات المتطورة عن العديد من المجالات ذات الصلة، على سبيل المثال فيزياء الجوامد، هندسة البث، والاتصال عن بعد، ونظم التحكم، معالجة الإشارة، وهندسة الأنظمة وهندسة الحاسب الآلي، هندسة الأجهزة الدقيقة وتحكم الطاقة الالكترونية، والروبوتية وغيرها الكثير. خلال هذه المحاضرات سنلقي الضوء على الهندسة الإلكترونية بشقيها العناصر الإلكترونية ثم يليه الدوائر الإلكترونية.

Research paper thumbnail of مدخل لهندسة القياسات Introduction to Measurements Engineering

Noor Publishing, 2020

القياس عملية فيزيائية تعتمد على التجربة العلمية التي تقارن بين مقادير يُراد قياسها وأخرى مرجعية م... more القياس عملية فيزيائية تعتمد على التجربة العلمية التي تقارن بين مقادير يُراد قياسها وأخرى مرجعية من جنسها فيزيائياً تُسمى واحدات القياس. ويؤدي علم القياس metrology دوراً رئيساً في تطور العلوم النظرية والتقنية. ومن أهدافه الأساسية استنتاج النظريات التي تكشف عن القوانين المعبرة كمياً عن القيم المختلفة. وتجرى عملية القياس بتقنيات متنوعة إلكترونية أو كهربائية أو ميكانيكية أو غيرها. وتعد التقنيات الكهربائية والإلكترونية أكثرها انتشاراً في جميع المجالات العلمية بسبب تميزها بالدقة والحساسية العاليتين وسرعة النتيجة وإمكان تنظيم المعلومات وتنسيقها وتحليلها إضافة إلى إمكان القياس عن بعد. وأدى التطور الكبير في تقنيات الهندسة الكهربائيه والإلكترونية إِلى ظهور أجهزة قياس مركبة يمكنها أن تقيس مقادير كهربائية وغير كهربائية من ميكانيكية وحرارية وحيوية وغيرها وأن تحلل نتائجها وتنسق بين مؤثراتها وتنظِّم معلوماتها.

Research paper thumbnail of Electronic Circuits  دوائر إلكترونية

هندسة إلكترونية, 2020

الدوائر الإلكترونية هي عبارة عن مسار مغلق من المكونات الإلكترونية الموصولة فيما بينها ويمكن للتيا... more الدوائر الإلكترونية هي عبارة عن مسار مغلق من المكونات الإلكترونية الموصولة فيما بينها ويمكن للتيار الكهربائي المرور عبرها وهي المكون الأساسي لكل الأجهزة الإلكترونية. تعد الدارات الإلكترونية electronic circuits أساس النظم الإلكترونية التي تستخدم في مجالات هندسية شتى مثل التحكم والقياس ومعالجة الإشارة. ويعد الثنائي ذو الوصلة والترانزيستور الوسيلتين الفعالتين الأساسيتين في تركيب أي دارة إلكترونية. تتكون الدائرة الإلكترونية بشكل أساسي من عناصر غير فعالة مثل مقاومة(resistor) ومكثف (capacitor) والملفات (coils)وعناصر فعالة مثل الترانزستور (transistor) والكثير من المكونات الأخرى التي تجتمع لتكون الدائرة الإلكترونية. يتم تدريس علم الإلكترونيات في العديد من الجامعات في مختلف أنحاء العالم، وهو علم يعنى بتفاعل عناصر الدائرة الإلكترونية مع بعضها البعض. وتتدرج الدوائر الإلكترونية من دائرة بسيطة تمثل مصدر فرق جهد ومقاومة مثل (بطاريه وضوء صغير) إلى دوائر معقدة تحتاج إلى عدة مهندسين وساعات من العمل لتحليلها مثل اللوحة الرئيسية للكميوتر.

Research paper thumbnail of Adaptive Navigation and Motion Planning for Autonomous Mobile Robots: Mobile Robots, Navigation, Path Planning, Visual Tracking and Sensor Integration

Book, 2011

Exploring autonomy in robotics is a meaningful task. The intuitive definition of autonomy is the ... more Exploring autonomy in robotics is a meaningful task. The intuitive definition of autonomy is the capability of a robot to make a decision based on its own knowledge, acquired by its distributed sensors, without any human interference. Throughout this framework we discuss some algorithms and techniques underlying the subjects of adaptive navigation, motion planning and sensor integration for autonomous mobile robots. Mobile Robots will play an important role in many future applications, such as personal and service robots, handicapped aid, entertainment, space exploration, medical applications, nuclear industry, surveillance or autonomous transportation. It is the mobility that distinguishes a mobile platform from robot manipulators and gives the possibility to actively and adaptively interact with the environment and humans. In real world environments actual mobile robot platforms will need increased adaptability and autonomy with better techniques for navigation safety, map building, obstacle avoidance and path planning. This research work will first focus on sensor integration and adapted interaction that is considered one of the major basic concepts for mobile platforms.

Research paper thumbnail of Genetic Algorithms Theories and Applications

LAP LAMBERT , 2012

The objective of this book is to present the latest state-of-the-art theories, methodologies and ... more The objective of this book is to present the latest state-of-the-art theories, methodologies and applications of GAs. It deals with the theoretical and methodological aspects, as well as various applications in a variety of disciplines. GAs are applied to real world problems from science, technology, biology, chemistry, social sciences, business and commerce. This book comprises of several chapters including theories and applications giving the fundamentals and many important research challenges in this field of study. This book has been designed to be beneficial to most practicing scientists and engineers interested in this area.

Research paper thumbnail of Artificial Intelligence Theories and Methodologies, Applied R&D Projects

Book, 2020

AI succeeded to dominate our daily life starting from our cell phones, appliance and smart cars t... more AI succeeded to dominate our daily life starting from our cell phones, appliance and smart cars to nuclear reactors and space stations. The domination of AI on our human life brought a lot of fear in research and technology arenas where many pioneers like Stephen Hawking, Bill Gates, Elon Musk and others warn AI and express their worries about a possible conflict between humans and intelligent machines where intelligent machines may end the mankind. Even if these worries are sometimes classified as irrational overstating, the truth of the strong presence of AI technologies in our life will be indisputable. What makes me little bit confused is whether humans are afraid of fighting artificial agents or they are afraid of falling in love with them. The rapid development of socially active and emotionally interactive agent is relying on development of high performance artificial nervous system, artificial brain and synthetic spinal cord. As the development of the integrated synthetic nervous system reaches a considerable maturity level, as the day of independence of artificial agents gets closer. The rate of the development depends on the success of the global endeavors of public and private institutions paid to raise the level of AI. And a question will stay open, will we accept our handmade artificial partners? Throughout this book several important articles are presented to explain some AI theories and methodologies. I appreciate the hard effort of all participants done to accomplish this work.

Research paper thumbnail of Academic Projects on, Computational Sciences & Engineering, Applied Artificial Intelligence

Book, 2020

This book emphasizes on recent trends of research and development on computational science and en... more This book emphasizes on recent trends of research and development on computational science and engineering and provides a central guide for scientists, researchers, engineers and vendors from different disciplines to exchange ideas, identify problems, investigate relevant issues, share common interests, and explore new approaches. The book significantly benefits a wide variety of academic and industrial sectors. It presents more than 40 refereed articles on the emergent topics of the computational science and engineering.