The main purpose of the presented paper is to establish a secure way by integrating the biologica... more The main purpose of the presented paper is to establish a secure way by integrating the biological characteristic as a key with cryptographic applications. A binary string is generated reliably from genuine fingerprint conventions. That key is generated from a subject’s fingerprint image with the aid of SDK, which do not reveal the key. The reproduction of that key depends on the equivalent biometric fingerprint. That’s why the general key distribution problem is always refer to the task of distributing secret keys between communicating parties to provide security properties such as secrecy and authentication. A novel technique is introduced to exchange personal biometric fingerprint (payload) as a symmetric key in secrecy using Secure Hash Algorithm 1 which is working as a cryptographic hash function one way to produce 20-bytes hash value known as a message digest. Then the asymmetric cryptosystem is used to transport that key in a safe way to the other parties. Once they have the ...
This research is considered as a result of an accumulative work for many years to demonstrate a m... more This research is considered as a result of an accumulative work for many years to demonstrate a model for the heavy computational components of any World Wide Web (WWW) search engine. This architecture is based on the grid computing. The crawling load is distributed over a set of computers to retrieve more crawled pages in less time. The proposed architecture of the indexer distributes the indexing load over a set of computers and supports the dynamic indexing to deal with the frequent changes in the web contents. So, the proposed architectures of the crawler and the indexer support the freshness of the web pages. The used freshness technique is considered in the crawler and the indexer where the dynamic indexer is responsible of determining the old pages and sending them to the crawler to revisit them for updating. The Search module is implemented including Arabic morphological analysis/generation and synonym dictionary which are combined to produce an Intelligent Arabic Internet S...
Customer Relationship Management (CRM) is an important tool for organizations to win a good share... more Customer Relationship Management (CRM) is an important tool for organizations to win a good share of the market for their products. Call Centers are the backbone of the operational side in Customer service and support of CRM. Contact centers have been typically human-based service systems. This research presents a future vision which involving multidiscipline system that achieves many goals for CRM and Business Intelligence using database, Artificial Intelligence and Text Mining techniques for unstructured data. The objective of this research is to design and implement an automated system to support customers and reduce the tasks of the Contact center human resources. The proposed system is composed of many modules which are implemented in stages. This research presents a usage of a proposed Arabic Question Answering (QA) Module as a main module in an automated contact center. The proposed system receives a natural language query from the user in a form of a speech or text. It prese...
Satellite communication systems are now designed according to an outdated Shannon information the... more Satellite communication systems are now designed according to an outdated Shannon information theory where all data is transmitted in meaningless bit streams. The advantages for satellite communication may include: high image compression and unbreakable encryption. So, this paper combines the compression and encryption techniques into two phases, encoding and decoding phase. The fractal compression technique is selected to compress the aerial images due its high compression capability and the Enhanced Hill Multimedia Cryptosystem (EHMC) is used for encryption to perform the goal. The fractal image compression of the input aerial image is the first stage in the encoding phase. The fractal compression technique divides the original image into two different block sizes called range and domain blocks. The best match between the range and domain blocks is known as the transformation mapping. All the transformation mappings are recorded as the output compressed file of the input aerial im...
2015 SAI Intelligent Systems Conference (IntelliSys), 2015
Complaints Management (CM) is one of the important elements in Customer Relationship Management (... more Complaints Management (CM) is one of the important elements in Customer Relationship Management (CRM) system of any organization which helps in customer retention for the longest possible period of time. In this research, a system called Complaint Classification System (CCS) is implemented to discuss how Data Mining Techniques (DMT) can be used to classify and direct complaints to the departments responsible for them. This may help to renew the client confidence with the organization. To achieve this, many algorithms are used in classification and are compared to use the most efficient of them in the practical system. The used algorithms are the centroid-based classifier, the Voting k-Nearest Centroid Neighbor (VK-NCN) algorithm, the Weighted k-Nearest Centroid Neighbor (WK-NCN) and the Local Mean K-Nearest Centroid Neighbor (LM-KNCN) algorithm. Centroid-based classifier algorithm is proved to have the best performance during the usage of cosine measure while LM-KNCN algorithm is proved to have the best performance during the usage of Euclidean distance measure.
2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE), 2010
... Waleed Oransa and Mohamed Kouta College of Computing and Information Technology Arab Academy ... more ... Waleed Oransa and Mohamed Kouta College of Computing and Information Technology Arab Academy for Science and Technology Cairo, Egypt w_oransa@yahoo.com, mmkouta2004@ yahoo.com ... [5] Hany Hassan, Khalil Sima'an, and Andy Way, (2008) Syntactically ...
The main purpose of the presented paper is to establish a secure way by integrating the biologica... more The main purpose of the presented paper is to establish a secure way by integrating the biological characteristic as a key with cryptographic applications. A binary string is generated reliably from genuine fingerprint conventions. That key is generated from a subject’s fingerprint image with the aid of SDK, which do not reveal the key. The reproduction of that key depends on the equivalent biometric fingerprint. That’s why the general key distribution problem is always refer to the task of distributing secret keys between communicating parties to provide security properties such as secrecy and authentication. A novel technique is introduced to exchange personal biometric fingerprint (payload) as a symmetric key in secrecy using Secure Hash Algorithm 1 which is working as a cryptographic hash function one way to produce 20-bytes hash value known as a message digest. Then the asymmetric cryptosystem is used to transport that key in a safe way to the other parties. Once they have the ...
This research is considered as a result of an accumulative work for many years to demonstrate a m... more This research is considered as a result of an accumulative work for many years to demonstrate a model for the heavy computational components of any World Wide Web (WWW) search engine. This architecture is based on the grid computing. The crawling load is distributed over a set of computers to retrieve more crawled pages in less time. The proposed architecture of the indexer distributes the indexing load over a set of computers and supports the dynamic indexing to deal with the frequent changes in the web contents. So, the proposed architectures of the crawler and the indexer support the freshness of the web pages. The used freshness technique is considered in the crawler and the indexer where the dynamic indexer is responsible of determining the old pages and sending them to the crawler to revisit them for updating. The Search module is implemented including Arabic morphological analysis/generation and synonym dictionary which are combined to produce an Intelligent Arabic Internet S...
Customer Relationship Management (CRM) is an important tool for organizations to win a good share... more Customer Relationship Management (CRM) is an important tool for organizations to win a good share of the market for their products. Call Centers are the backbone of the operational side in Customer service and support of CRM. Contact centers have been typically human-based service systems. This research presents a future vision which involving multidiscipline system that achieves many goals for CRM and Business Intelligence using database, Artificial Intelligence and Text Mining techniques for unstructured data. The objective of this research is to design and implement an automated system to support customers and reduce the tasks of the Contact center human resources. The proposed system is composed of many modules which are implemented in stages. This research presents a usage of a proposed Arabic Question Answering (QA) Module as a main module in an automated contact center. The proposed system receives a natural language query from the user in a form of a speech or text. It prese...
Satellite communication systems are now designed according to an outdated Shannon information the... more Satellite communication systems are now designed according to an outdated Shannon information theory where all data is transmitted in meaningless bit streams. The advantages for satellite communication may include: high image compression and unbreakable encryption. So, this paper combines the compression and encryption techniques into two phases, encoding and decoding phase. The fractal compression technique is selected to compress the aerial images due its high compression capability and the Enhanced Hill Multimedia Cryptosystem (EHMC) is used for encryption to perform the goal. The fractal image compression of the input aerial image is the first stage in the encoding phase. The fractal compression technique divides the original image into two different block sizes called range and domain blocks. The best match between the range and domain blocks is known as the transformation mapping. All the transformation mappings are recorded as the output compressed file of the input aerial im...
2015 SAI Intelligent Systems Conference (IntelliSys), 2015
Complaints Management (CM) is one of the important elements in Customer Relationship Management (... more Complaints Management (CM) is one of the important elements in Customer Relationship Management (CRM) system of any organization which helps in customer retention for the longest possible period of time. In this research, a system called Complaint Classification System (CCS) is implemented to discuss how Data Mining Techniques (DMT) can be used to classify and direct complaints to the departments responsible for them. This may help to renew the client confidence with the organization. To achieve this, many algorithms are used in classification and are compared to use the most efficient of them in the practical system. The used algorithms are the centroid-based classifier, the Voting k-Nearest Centroid Neighbor (VK-NCN) algorithm, the Weighted k-Nearest Centroid Neighbor (WK-NCN) and the Local Mean K-Nearest Centroid Neighbor (LM-KNCN) algorithm. Centroid-based classifier algorithm is proved to have the best performance during the usage of cosine measure while LM-KNCN algorithm is proved to have the best performance during the usage of Euclidean distance measure.
2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE), 2010
... Waleed Oransa and Mohamed Kouta College of Computing and Information Technology Arab Academy ... more ... Waleed Oransa and Mohamed Kouta College of Computing and Information Technology Arab Academy for Science and Technology Cairo, Egypt w_oransa@yahoo.com, mmkouta2004@ yahoo.com ... [5] Hany Hassan, Khalil Sima'an, and Andy Way, (2008) Syntactically ...
Uploads
Papers by Mohammed Sakre