International Journal of Computational Intelligence Systems
The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by en... more The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread adoption of IoT has also brought forth significant security challenges for manufacturers and consumers alike. Detecting network intrusions in IoT networks using machine learning techniques shows promising potential. However, selecting an appropriate machine learning algorithm for intrusion detection poses a considerable challenge. Improper algorithm selection can lead to reduced detection accuracy, increased risk of network infection, and compromised network security. This article provides a comparative evaluation to six state-of-the-art boosting-based algorithms for detecting intrusions in IoT. The methodology overview involves benchmarking the performance of the selected boosting-based algorithms in multi-class classification. The evaluation includes a comprehensive classification performance analysis includes accurac...
Internet of Things has many applications requiring the use of wireless communications networks. I... more Internet of Things has many applications requiring the use of wireless communications networks. It utilizes data collection from sensor nodes connected to Wireless Sensor Networks. As such the wireless sensor networks is considered an important key for data transmission between sensor node and the gateways which are connected to the internet. Of the main concerns is the lifetime of the network which is affected by the battery power of the sensor nodes. It is noteworthy that transmission energy that dominates overall energy consumption is proportional to the distance between the transmitter and receiver. Thus, there is a need to send data from source node to a destination node in the most efficient way when it comes to battery level. Although there are many algorithms that tried to perform energy efficient routing, we will propose an intelligent algorithm to further improve this routing problem. In this paper we proposed an AI algorithm to enhance the lifetime of wireless sensor netw...
The increase in people’s use of mobile messaging services has led to the spread of social enginee... more The increase in people’s use of mobile messaging services has led to the spread of social engineering attacks like phishing, considering that spam text is one of the main factors in the dissemination of phishing attacks to steal sensitive data such as credit cards and passwords. In addition, rumors and incorrect medical information regarding the COVID-19 pandemic are widely shared on social media leading to people’s fear and confusion. Thus, filtering spam content is vital to reduce risks and threats. Previous studies relied on machine learning and deep learning approaches for spam classification, but these approaches have two limitations. Machine learning models require manual feature engineering, whereas deep neural networks require a high computational cost. This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically. The proposed model utilizes convolutional and pooling layers for feature extraction along...
2018 28th International Conference on Computer Theory and Applications (ICCTA), 2018
DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.
The process of information propagation through the Internet may expose it to risk by discovering ... more The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium to get secret communication. There are several challenges facing the process of data hiding in images, such as embedding capacity, image quality, security, and computational complexity. In order to handle these challenges, this paper brings out a new data hiding system for true color images. The proposed system combines the merits of imperceptibility feature of LSB technique working in spatial domain with robust embedding policy based on salient features guided by human visual perception extracted from transform domain. The system translates the images into HSV color space that has the ability to isolate chromatic and achromatic components with the aim of increasing hiding quality. To improve security of embedding locations, the system uses secret-key for wavelet decomposition. In our ca...
2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017
Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.
Transactions on networks and communications, Jun 12, 2014
Information Technology (IT) field before cloud computing is not the same after. It has recently a... more Information Technology (IT) field before cloud computing is not the same after. It has recently accelerated as new criteria for presenting and delivering services over the Internet. Cloud Computing is reacting positively as a concept that may greatly improve the smart devices (Smartphone, Tablet and Fablet) reliability. This paper mainly concentrates to enhance the smart devices dependability through and applications (app) during offloading of services among cloud and device to save energy, many challenges had faced that idea ex: unstable network, unstable Internet services, Synchronization and the limitations of open source smart devices operating system (OS). In order to cure the earlier challenges, An Android OS used with a new layer to offload the non-critical app's jobs. That should occur in One's of two clouds developed specially to do that, the first cloud is a private, connected with smart device through the same data network on-line and the second cloud is a public, related to the previous cloud and the smart device off-line when Internet exists. Using this system, Smart device users may choose to run their mobile application jobs either locally or offloading it to the cloud, this shall save energy spent from the smart device battery when using Third generation of mobile network (3G) or WI-FI. This system has achieved in the provision of high-energy reached 98.67% and will be seen in the context of this research paper.
Over the past decade, Business Intelligence (BI) has been adopted by major corporations around th... more Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on documentation, data based and departmental involvement for taking decisions. This
Computer Applications in Engineering Education, 1995
In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major obj... more In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major objective of this work was to investigate the potential of using such systems as tools for transferring instructional course information through various types of computer media as opposed to the classic CAL systems. The philosophy and techniques employed to design the system are investigated. Usage of the implemented system and its merits have been illustrated through its application to teach engineering students and technicians the theory and concepts of marine radar. System design, implementation, test, and revision phases are presented and discussed.
In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.
Compression is the art of representing information in a compressed form and not in its original o... more Compression is the art of representing information in a compressed form and not in its original or uncompressed form. In other words, using data compression. Image compression is a critical task in image processing, the use of discrete shearlet and improved image compression and quality. With the event within the field of networking and within the process of sending and receiving files, we would have liked effective techniques for compression because the raw images required large amounts of disc space to effect during transportation and storage operations. In this paper, we have proposed a system for lossless picture compression using Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). We use lossless compression to take care of the first image during that process, but there's a serious problem which is frequently the low compression ratios. The main objective of image compression is to reduce the frequency of image data, whi...
International Journal of Computational Intelligence Systems
The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by en... more The Internet-of-Things (IoT) environment has revolutionized the quality of living standards by enabling seamless connectivity and automation. However, the widespread adoption of IoT has also brought forth significant security challenges for manufacturers and consumers alike. Detecting network intrusions in IoT networks using machine learning techniques shows promising potential. However, selecting an appropriate machine learning algorithm for intrusion detection poses a considerable challenge. Improper algorithm selection can lead to reduced detection accuracy, increased risk of network infection, and compromised network security. This article provides a comparative evaluation to six state-of-the-art boosting-based algorithms for detecting intrusions in IoT. The methodology overview involves benchmarking the performance of the selected boosting-based algorithms in multi-class classification. The evaluation includes a comprehensive classification performance analysis includes accurac...
Internet of Things has many applications requiring the use of wireless communications networks. I... more Internet of Things has many applications requiring the use of wireless communications networks. It utilizes data collection from sensor nodes connected to Wireless Sensor Networks. As such the wireless sensor networks is considered an important key for data transmission between sensor node and the gateways which are connected to the internet. Of the main concerns is the lifetime of the network which is affected by the battery power of the sensor nodes. It is noteworthy that transmission energy that dominates overall energy consumption is proportional to the distance between the transmitter and receiver. Thus, there is a need to send data from source node to a destination node in the most efficient way when it comes to battery level. Although there are many algorithms that tried to perform energy efficient routing, we will propose an intelligent algorithm to further improve this routing problem. In this paper we proposed an AI algorithm to enhance the lifetime of wireless sensor netw...
The increase in people’s use of mobile messaging services has led to the spread of social enginee... more The increase in people’s use of mobile messaging services has led to the spread of social engineering attacks like phishing, considering that spam text is one of the main factors in the dissemination of phishing attacks to steal sensitive data such as credit cards and passwords. In addition, rumors and incorrect medical information regarding the COVID-19 pandemic are widely shared on social media leading to people’s fear and confusion. Thus, filtering spam content is vital to reduce risks and threats. Previous studies relied on machine learning and deep learning approaches for spam classification, but these approaches have two limitations. Machine learning models require manual feature engineering, whereas deep neural networks require a high computational cost. This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically. The proposed model utilizes convolutional and pooling layers for feature extraction along...
2018 28th International Conference on Computer Theory and Applications (ICCTA), 2018
DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.
The process of information propagation through the Internet may expose it to risk by discovering ... more The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium to get secret communication. There are several challenges facing the process of data hiding in images, such as embedding capacity, image quality, security, and computational complexity. In order to handle these challenges, this paper brings out a new data hiding system for true color images. The proposed system combines the merits of imperceptibility feature of LSB technique working in spatial domain with robust embedding policy based on salient features guided by human visual perception extracted from transform domain. The system translates the images into HSV color space that has the ability to isolate chromatic and achromatic components with the aim of increasing hiding quality. To improve security of embedding locations, the system uses secret-key for wavelet decomposition. In our ca...
2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017
Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.
Transactions on networks and communications, Jun 12, 2014
Information Technology (IT) field before cloud computing is not the same after. It has recently a... more Information Technology (IT) field before cloud computing is not the same after. It has recently accelerated as new criteria for presenting and delivering services over the Internet. Cloud Computing is reacting positively as a concept that may greatly improve the smart devices (Smartphone, Tablet and Fablet) reliability. This paper mainly concentrates to enhance the smart devices dependability through and applications (app) during offloading of services among cloud and device to save energy, many challenges had faced that idea ex: unstable network, unstable Internet services, Synchronization and the limitations of open source smart devices operating system (OS). In order to cure the earlier challenges, An Android OS used with a new layer to offload the non-critical app's jobs. That should occur in One's of two clouds developed specially to do that, the first cloud is a private, connected with smart device through the same data network on-line and the second cloud is a public, related to the previous cloud and the smart device off-line when Internet exists. Using this system, Smart device users may choose to run their mobile application jobs either locally or offloading it to the cloud, this shall save energy spent from the smart device battery when using Third generation of mobile network (3G) or WI-FI. This system has achieved in the provision of high-energy reached 98.67% and will be seen in the context of this research paper.
Over the past decade, Business Intelligence (BI) has been adopted by major corporations around th... more Over the past decade, Business Intelligence (BI) has been adopted by major corporations around the world. A BI tool's function facilitates the process of taking decisions for managers. However, decision-making, especially strategic decisions, still remains an ill-defined process locked in the minds of managers. The maritime transport sector depends on documentation, data based and departmental involvement for taking decisions. This
Computer Applications in Engineering Education, 1995
In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major obj... more In this article a multimedia computer‐assisted learning (MCAL) system is presented. The major objective of this work was to investigate the potential of using such systems as tools for transferring instructional course information through various types of computer media as opposed to the classic CAL systems. The philosophy and techniques employed to design the system are investigated. Usage of the implemented system and its merits have been illustrated through its application to teach engineering students and technicians the theory and concepts of marine radar. System design, implementation, test, and revision phases are presented and discussed.
In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.
Compression is the art of representing information in a compressed form and not in its original o... more Compression is the art of representing information in a compressed form and not in its original or uncompressed form. In other words, using data compression. Image compression is a critical task in image processing, the use of discrete shearlet and improved image compression and quality. With the event within the field of networking and within the process of sending and receiving files, we would have liked effective techniques for compression because the raw images required large amounts of disc space to effect during transportation and storage operations. In this paper, we have proposed a system for lossless picture compression using Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). We use lossless compression to take care of the first image during that process, but there's a serious problem which is frequently the low compression ratios. The main objective of image compression is to reduce the frequency of image data, whi...
Uploads
Papers by Shawkat Guirguis