Computer Science and Information System Research Papers (original) (raw)
Diagnosis the computed tomography images (CT-images) is one of the images that may take a lot of time in diagnosis by the radiologist and may miss some of cancerous nodules in these images. Therefore, in this paper a new novel enhancement... more
Diagnosis the computed tomography images (CT-images) is one of the images that may take a lot of time in diagnosis by the radiologist and may miss some of cancerous nodules in these images. Therefore, in this paper a new novel enhancement and detection cancerous nodule algorithm is proposed to diagnose a CT-images. The novel algorithm is divided into three main stages. In first stage, suspicious regions are enhanced using modified LoG algorithm. Then in stage two, a potential cancerous nodule was detected based on visual appearance in lung. Finally, five texture features analysis algorithm is implemented to reduce number of detected FP regions. This algorithm is evaluated using 60 cases (normal and cancerous cases), and it shows a high sensitivity in detecting the cancerous lung nodules with TP ration 97% and with FP ratio 25 cluster/image.
Multipath environment is a limitation fact in optimized usage of wireless networks. Using smart antenna and beamforming algorithms contributed to that subscribers get a higher-gain signal and better directivity as well as reduce the... more
Multipath environment is a limitation fact in optimized usage of wireless networks. Using smart antenna and beamforming algorithms contributed to that subscribers get a higher-gain signal and better directivity as well as reduce the consumed power for users and the mobile base stations by adjusting the appropriate weights for each element in the antenna array that leads to reducing interference anddirecting the main beam to wanted user. In this paper, the performance of three of beamforming algorithms in multipath environment in terms of directivity and side lobe level reduction has been studied and compared, which are least mean square (LMS), genetic algorithm (GA) and grey wolf optimization (GWO) technique. The simulation result appears that LMS algorithm aids us to get the best directivity followed by the GWO, and we may get most sidelobe level reduction by using the GA algorithm, followed by LMS algorithm in second rank.
With the huge development in mobile and network fields, sensor technologies and fog computing help the students for more effective learning, flexible and in and effective manner from anywhere. Using the mobile device for learn encourage... more
With the huge development in mobile and network fields, sensor technologies and fog computing help the students for more effective learning, flexible and in and effective manner from anywhere. Using the mobile device for learn encourage the transition to mobile computing (cloud and fog computing) which is led to the ability to design customized system that help student to learn via context aware learning which can be done by set the user preference and use proper methods to show only related manner subject. The presented study works on developing a system of e-learning which has been on the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for accomplishing the context aware learning and use the adaptation of video quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation.
Online learning and teaching become the popular channel for all participants, because they can access the courses everywhere with the high-speed internet. E-certificate is being prepared for everyone who has participated or passed the... more
Online learning and teaching become the popular channel for all participants, because they can access the courses everywhere with the high-speed internet. E-certificate is being prepared for everyone who has participated or passed the requirements of the courses. Because of many benefits frome-certificate, it may become the demand for intruders to counterfeit the certificate. In this paper, Rivest-Shamir-Adleman (RSA)’s digital signature is chosen to signe-certificate in order to avoid being counterfeited by intruders. There are two applications to managee-certificate. The first application is the signing application to sign the sub image including only participant’s name in e-certificate. In general, the file of digital signature is divided frome-certificate. That means, both of them must be selected to compare each other in checking application. In fact, the solution will be approved when each pixel of participant’s name is equal to each part from the decrypted message at the same position. In experimental session, 40 e-certificatesare chosen for the implementation. The results reveal that the accuracy is 100% and both of signing and checking processes are completed rapidly fast, especially when signing application is applied with Chinese remainder theorem (CRT) or the special technique of CRT. Therefore, the proposed method is one of the best solutions to protect e-certificate from the forgery by intruders.
Emotion recognition using images, videos, or speech as input is considered as a hot topic in the field of research over some years. With the introduction of deep learning techniques, e.g., convolutional neural networks (CNN), applied in... more
Emotion recognition using images, videos, or speech as input is considered as a hot topic in the field of research over some years. With the introduction of deep learning techniques, e.g., convolutional neural networks (CNN), applied in emotion recognition, has produced promising results. Human facial expressions are considered as critical components in understanding one's emotions. This paper sheds light on recognizing the emotions using deep learning techniques from the videos. The methodology of the recognition process, along with its description, is provided in this paper. Some of the video-based datasets used in many scholarly works are also examined. Results obtained from different emotion recognition models are presented along with their performance parameters. An experiment was carried out on the fer2013 dataset in Google Colab for depression detection, which came out to be 97% accurate on the training set and 57.4% accurate on the testing set.
Lab work activities are one of the hearts of science learning, but several students have limited use and time to explore computer network tools. This study proposes a virtual reality (VR) application used to support lab work activities of... more
Lab work activities are one of the hearts of science learning, but several students have limited use and time to explore computer network tools. This study proposes a virtual reality (VR) application used to support lab work activities of a computer network so that students may conduct lab work activities by themselves at any time. The method used in this study is a multimedia development life cycle (MDLC) that consists of five stages, they are concept, design, material collecting, assembly, and testing & evaluation. A formative evaluation carried out by involving two experts, namely software expert and material expert, to measure the feasibility of application before conducting user testing. Meanwhile, a summative evaluation used to evaluate the VR application by involving 25 students who were taking the course of computer networking. Statistical analysis shows that the score of Cronbach's alpha test is higher than 0.6 for aspects of material subject and experience. Hence, the VR application can be used to support the lab work activities of a computer network.
Cloud users have recently expanded dramatically. The cloud service providers (CSPs) have also increased and have therefore made their infrastructure more complex. The complex infrastructure needs to be distributed appropriately to various... more
Cloud users have recently expanded dramatically. The cloud service providers (CSPs) have also increased and have therefore made their infrastructure more complex. The complex infrastructure needs to be distributed appropriately to various users. Also, the advances in cloud computing have led to the development of interconnected cloud computing environments (ICCEs). For instance, ICCEs include the cloud hybrid, intercloud, multi-cloud, and federated clouds. However, the sharing of resources is not facilitated by specific proprietary technologies and access interfaces used by CSPs. Several CSPs provide similar services but have different access patterns. Data from various CSPs must be obtained and processed by cloud users. To ensure that all ICCE tenants (users and CSPs) benefit from the best CSPs, efficient resource management was suggested. Besides, it is pertinent that cloud resources be monitored regularly. Cloud monitoring is a service that works as a third-party entity between customers and CSPs. This paper discusses a complete cloud monitoring survey in ICCE, focusing on cloud monitoring and its significance. Several current open-source monitoring solutions are discussed. A taxonomy is presented and analyzed for cloud resource management. This taxonomy includes resource pricing, assignment of resources, exploration of resources, collection of resources, and disaster management.
Our study is demonstrated a new type of evolutionary sound synthesis method. This work based on the fly algorithm, a cooperative co-evolution algorithm; it is derived from the Parisian evolution approach. The algorithm has relatively... more
Our study is demonstrated a new type of evolutionary sound synthesis method. This work based on the fly algorithm, a cooperative co-evolution algorithm; it is derived from the Parisian evolution approach. The algorithm has relatively amended the position of individuals (the Flies) represented by 3-D points. The fly algorithm has successfully investigated in different applications, starting with a real-time stereo vision for robotics. Also, the algorithm shows promising results in tomography to reconstruct 3-D images. The final application of the fly algorithm was generating artistic images, such as digital mosaics. In all these applications, the flies’representation started for simple, 3-D points, to complex one, the structure of 9-elements. Our method follows evolutionary digital art with the fly algorithm in representing the pattern of the flies. They represented in a way of having their structure. This structure includes position, colour, rotation angle, and size. Our algorithm has the benefit of graphics processing units (GPUs) to generate the sound waveform using the modern OpenGL shading language.
Automated detection of abnormal activity assumes a significant task in surveillance applications. This paper presents an intelligent framework video surveillance to detect abnormal human activity in an academic environment that takes into... more
Automated detection of abnormal activity assumes a significant task in surveillance applications. This paper presents an intelligent framework video surveillance to detect abnormal human activity in an academic environment that takes into account the security and emergency aspects by focusing on three abnormal activities (falling, boxing and waving). This framework designed to consist of the two essential processes: the first one is a tracking system that can follow targets with identify sets of features to understand human activity and measure descriptive information of each target. The second one is a decision system that can realize if the activity of the target track is "normal" or "abnormal” then energizing alarm when recognized abnormal activities.
Agile development methods have been catering the need of faster delivery of theever-demanding domain of software engineering. These methods are able to deliver value to users and businesses via fast, reliable, and repeatable process.... more
Agile development methods have been catering the need of faster delivery of theever-demanding domain of software engineering. These methods are able to deliver value to users and businesses via fast, reliable, and repeatable process. Planning requirements and processes takes the driving seat in a dynamic environment because the value proposition rapidly changes. This paper exhibits asystematic literature review of planning processes implementedby various agile methods in order to find the best suited agile method in terms of robust planning. Keywords: It was found that Scrum is the best suited agile method for planning processes.
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading... more
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
In the last decade, light-emitting diodes (LEDs), which based on spontaneous light emission in semiconductors can be considered as the main light sources for civil and industrial purposes. In this paper, we presented and investigated the... more
In the last decade, light-emitting diodes (LEDs), which based on spontaneous light emission in semiconductors can be considered as the main light sources for civil and industrial purposes. In this paper, we presented and investigated the effect of the Sr[Mg3SiN4]Eu2+ concentration on the optical properties of the 5600K remote-packaging WLEDs (RP-WLEDs). We use the Mat Lab and the LightTool software to investigate the effect of the Sr[Mg3SiN4]Eu2+ concentration on the CRI, CQS, D-CCT and LO of the 5600K RP-WLEDs. From the result, we can state that the concentration of the Sr[Mg3SiN4]Eu2+ influenced on the CRI, CQS, D-CCT and LO of the RP-WLEDs. The red Sr[Mg3SiN4]Eu2+ phosphor can be considered as the novel recommendation for LEDs industry.
The very close involvement of technology in the banking industry makes almost all banking activities and products currently dependent on information technology (IT). PT BPRS Bhakti Sumekar (PT BBS Bank) is one of the banks that realizes... more
The very close involvement of technology in the banking industry makes almost all banking activities and products currently dependent on information technology (IT). PT BPRS Bhakti Sumekar (PT BBS Bank) is one of the banks that realizes the importance of IT in the digital era and has included IT as part of the company's strategic plan. The company states that compliance with regulations, best practices, and standards is key to a successful IT implementation. In this study, the measurement of the capability level of corporate IT governance was conducted to determine what IT priorities were based on the company's strategic objectives and what recommendations could be given based on best practices to improve IT services in support of the company's strategic goals. The framework to be used is control objective for information and related technology (COBIT); the most widely used framework suitable for service-oriented organizations. The results of research using COBIT 2019 show how IT governance is needed by the company and what should be prioritized. The measurement results found that there is still a gap between management's expectations and the current level of capability and provide recommendations on what companies need to improve performance in order to meet expectations.
Business processes and software components, especially class diagrams, have a firm connection. Considering software components support the business process in providing an excellent product and service. Besides, business process changes... more
Business processes and software components, especially class diagrams, have a firm connection. Considering software components support the business process in providing an excellent product and service. Besides, business process changes affect on software component design. One of them usually appears on the label or name of the software component or business process. Sometimes, a related business process and software component appears in the different label but the same meaning rather than using the same label. This situation is problematic when there are many changes to be made, in which the software component's modifying process becomes quite long. Therefore, the software maintainers should obtain an efficient procedure to shorten the modifying process. One solution is by using conformity checking, which helps the software maintainers know which software component is related to a specific business process. This paper compared two leading topic modeling techniques, namely proba...
The exponential growth of information on the internet makes it troublesome for users to get valuable information. Text summarization is the process to overcome such a problem. An adequate summary must have wide coverage, high diversity,... more
The exponential growth of information on the internet makes it troublesome for users to get valuable information. Text summarization is the process to overcome such a problem. An adequate summary must have wide coverage, high diversity, and high readability. In this article, a new method for multi-document summarization has been supposed based on a harmony search algorithm that optimizes the coverage, diversity, and readability. Concerning the benchmark dataset Text Analysis Conference (TAC-2011), the ROUGE package used to measure the effectiveness of the proposed model. The calculated results support the effectiveness of the proposed approach.
During software maintenance, software systems need to be modified by adding or modifying source code. These changes are required to fix errors or adopt new requirements raised by stakeholders or market place. Identifying thetargeted piece... more
During software maintenance, software systems need to be modified by adding or modifying source code. These changes are required to fix errors or adopt new requirements raised by stakeholders or market place. Identifying thetargeted piece of code for refactoring purposes is considered a real challenge for software developers. The whole process of refactoring mainly relies on software developers’ skills and intuition. In this paper, a deep learning algorithm is used to develop a refactoring prediction model for highlighting the classes that require refactoring. More specifically, the gated recurrent unit algorithm is used with proposed pre-processing steps for refactoring predictionat the class level. The effectiveness of the proposed model is evaluated usinga very common dataset of 7 open source java projects. The experiments are conducted before and after balancing the dataset to investigate the influence of data sampling on the performance of the prediction model. The experimental analysis reveals a promising result in the field of code refactoring prediction.
Automated detection of abnormal activity assumes a significant task in surveillance applications. This paper presents an intelligent framework video surveillance to detect abnormal human activity in an academic environment that takes into... more
Automated detection of abnormal activity assumes a significant task in surveillance applications. This paper presents an intelligent framework video surveillance to detect abnormal human activity in an academic environment that takes into account the security and emergency aspects by focusing on three abnormal activities (falling, boxing and waving). This framework designed to consist of the two essential processes: the first one is a tracking system that can follow targets with identify sets of features to understand human activity and measure descriptive information of each target. The second one is a decision system that can realize if the activity of the target track is "normal" or "abnormal” then energizing alarm when recognized abnormal activities.
This paper proposes a modification approach for phased-based EVM in order to reduce the processing time without effect the quality of the magnified video. The proposed approach applies a resizing process on the input video using Lanczos-3... more
This paper proposes a modification approach for phased-based EVM in order to reduce the processing time without effect the quality of the magnified video. The proposed approach applies a resizing process on the input video using Lanczos-3 algorithm. Then, it decomposes video frames using steerable pyramid to obtain multi-scale frame with its orientation. Subsequently, the resulted frames are filtered by temporal filters for specific bands and the filtered frames are multiplied by a magnification factor. Now, both the magnified regions and the unmagnified regions for each frame are added together. Finally, reconstructing the produced magnified multi-scale frames using the inverse steerable pyramid. The experimental results show that superiority of the proposed approach compares to the conventional phase-based EVM in processing time, where the processing time reduction about 60-65%. Furthermore, this approach does not affect on the video quality, which maintain it in the boundary of the conventional Phase-based EVM.
Flash flood is a natural disaster that often occurs after heavy rain, and it is getting more common nowadays. The flood early warning and response system (FEWRS) can be installed to minimize the level of damage and the number of... more
Flash flood is a natural disaster that often occurs after heavy rain, and it is getting more common nowadays. The flood early warning and response system (FEWRS) can be installed to minimize the level of damage and the number of casualties due to flood by providing accurate and reliable flood data. Unfortunately, the existing number of studies detailing on the factors affecting the efficiency of FEWRS in flood disaster is quite limited. The above issue is addressed in the current work, which involves conducting a comprehensive literature review on the factors that drive the effectiveness of information systems (IS) in FEWRS. The current analysis was based on the Wymer and Regan's standards. From the 66 factors identified from the previous studies on IS adoption, the most significant factors affecting the effectiveness of FEWRS are: system quality, information quality, user satisfaction, service quality, use, perceived usefulness, intention to use,net benefits, perceived ease of use,compatibility, user experience, relative advantage, complexity, perceivedrisks, educational quality, and confirmation, these factors can be constructed to the success model to address the effectiveness of FEWRS in disaster management.
The clustering approach is considered as a vital method for many fields suchas machine learning, pattern recognition, image processing, information retrieval, data compression, computer graphics, and others.Similarly, it hasgreat... more
The clustering approach is considered as a vital method for many fields suchas machine learning, pattern recognition, image processing, information retrieval, data compression, computer graphics, and others.Similarly, it hasgreat significance in wireless sensor networks (WSNs) by organizing thesensor nodes into specific clusters. Consequently, saving energy and prolonging network lifetime, which is totally dependent on the sensor’s battery, that is considered asa major challenge in the WSNs. Fuzzyc-means (FCM) is one of classification algorithm, which is widely used in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces this algorithm to produce unbalanced clusters, which adversely affects the lifetime of the network.To overcome this problem, a new clustering method called FCM-CMhas been proposed by improving the FCM algorithm to form balanced clustersfor random nodes deployment. The improvement is conductedby integrating the FCM with a centralized mechanism(CM).The proposed method will be evaluated based on four new parameters. Simulation result shows that our proposed algorithm is more superior to FCM by producing balanced clustersin addition to increasing the balancing of the intra-distances of the clusters, which leads to energy conservation and prolonging network lifespan.
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then... more
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.
Business processes and software components, especially class diagrams, have a firm connection. Considering software components support the business process in providing an excellent product and service. Besides, business process changes... more
Business processes and software components, especially class diagrams, have a firm connection. Considering software components support the business process in providing an excellent product and service. Besides, business process changes affect on software component design. One of them usually appears on the label or name of the software component or business process. Sometimes, a related business process and software component appears in the different label but the same meaning rather than using the same label. This situation is problematic when there are many changes to be made, in which the software component's modifying process becomes quite long. Therefore, the software maintainers should obtain an efficient procedure to shorten the modifying process. One solution is by using conformity checking, which helps the software maintainers know which software component is related to a specific business process. This paper compared two leading topic modeling techniques, namely probabilistic latent semantic analysis (PLSA) and latent Dirichlet allocation (LDA), to determine which one has a better performancefor process traceability.
One of the most promising mechanisms in the field of security and information safety is authentication based on palm vein. The main reasons that vein palm becomes an authentication method is because of its distinctive privacy, as it is... more
One of the most promising mechanisms in the field of security and information safety is authentication based on palm vein. The main reasons that vein palm becomes an authentication method is because of its distinctive privacy, as it is difficult to manipulate or change its results, because of the location of the vein within the palm. With the use of this technology, it has become easy to maintain data from unauthorized access and unwanted persons. In this work proposed model are suggested that contain four stages to reach the results: in the first stage is the pre-processing stage where histogram equation was used to enhance the image and the properties are shown, the second stage is the extracting the properties where, Gabor filter and 2-discrete wavelet filters are suggested for features extraction, where it is considered one of the most important filters used to extract the features, as well as in the third stage "PCA" are used for data or features reduction, because of its advantages in analyzing the features and reducing the spacing between them. As for the last stage, the Euclidean distance used to measure the spacing. The results were acceptable and convincing, since the similarity ratio 96.2%. These results were obtained after several tests and using the Gabor filter with 2D-discrete wavelet transform and principal component analysis (PCA), I got the best results.
Emotion recognition using images, videos, or speech as input is considered as a hot topic in the field of research over some years. With the introduction of deep learning techniques, e.g., convolutional neural networks (CNN), applied in... more
Emotion recognition using images, videos, or speech as input is considered as a hot topic in the field of research over some years. With the introduction of deep learning techniques, e.g., convolutional neural networks (CNN), applied in emotion recognition, has produced promising results. Human facial expressions are considered as critical components in understanding one's emotions. This paper sheds light on recognizing the emotions using deep learning techniques from the videos. The methodology of the recognition process, along with its description, is provided in this paper. Some of the video-based datasets used in many scholarly works are also examined. Results obtained from different emotion recognition models are presented along with their performance parameters. An experiment was carried out on the fer2013 dataset in Google Colab for depression detection, which came out to be 97% accurate on the training set and 57.4% accurate on the testing set.
Lab work activities are one of the hearts of science learning, but several students have limited use and time to explore computer network tools. This study proposes a virtual reality (VR) application used to support lab work activities of... more
Lab work activities are one of the hearts of science learning, but several students have limited use and time to explore computer network tools. This study proposes a virtual reality (VR) application used to support lab work activities of a computer network so that students may conduct lab work activities by themselves at any time. The method used in this study is a multimedia development life cycle (MDLC) that consists of five stages, they are concept, design, material collecting, assembly, and testing & evaluation. A formative evaluation carried out by involving two experts, namely software expert and material expert, to measure the feasibility of application before conducting user testing. Meanwhile, a summative evaluation used to evaluate the VR application by involving 25 students who were taking the course of computer networking. Statistical analysis shows that the score of Cronbach's alpha test is higher than 0.6 for aspects of material subject and experience. Hence, the VR application can be used to support the lab work activities of a computer network.
One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have... more
One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have different security levels and there are many standards and protocols fortesting the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be use damong these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR),correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.
Network connection logs have long been recognized as integral to proper network security, maintenance, and performance management. This paper provides a development of distributed systems and write optimized databases: However, even a... more
Network connection logs have long been recognized as integral to proper network security, maintenance, and performance management. This paper provides a development of distributed systems and write optimized databases: However, even a somewhat sizable network will generate large amounts of logs at very high rates. This paper explains why many storage methods are insufficient for providing real-time analysis on sizable datasets and examines database techniques attempt to address this challenge. We argue that sufficient methods include distributing storage, computation, and write optimized datastructures (WOD). Diventi, a project developed by Sandia National Laboratories, is here used to evaluate the potential of WODs to manage large datasets of network connection logs. It can ingest billions of connection logs at rates over 100,000 events per second while allowing most queries to complete in under one second. Storage and computation distribution are then evaluated using Elastic-search, an open-source distributed search and analytics engine. Then, to provide an example application of these databases, we develop a simple analytic which collects statistical information and classifies IP addresses based upon behavior. Finally, we examine the results of running the proposed analytic in real-time upon broconn (now Zeek) flow data collected by Diventi at IEEE/ACM Supercomputing 2019.