2011 4th International Conference on Logistics, 2011
ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics ... more ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics (LOGISTIQUA 2011), we would like to welcome you.
Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer ... more Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer neural networks with back propagation to crack a linear stream cipher with LFSR as a key generator, assuming that the cryptanalyst has obtained a finite sequence of known plaintext. ...
2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017
This research is conducted to study the problem of budget allocation for acquisitions in academic... more This research is conducted to study the problem of budget allocation for acquisitions in academic libraries, especially for book collections and how to solve this problem using decision support systems. Several attributes that affect the decision making process have been investigated through the literature review and an interview conducted with the director of the Applied Science University's library which is the subject of this study. After identifying the problem and the attributes affecting the decision making process, a decision support system is proposed. A classification model was used to classify library departments under different management budget allocation classes, using a decision tree classifier.
The main objective of this paper is to propose a cloud based framework handling security issues i... more The main objective of this paper is to propose a cloud based framework handling security issues in the existing data storage systems. There are various cyber security threats to existing storage systems because of their traditional architecture and operations applied on them for managing the data within Bahrain. Migration of local storage services to cloud environment is found to solve numerous related cyber security issues within Bahrain. On the other hand, a number of cyber security vulnerabilities are found to be emerged as a result of this migration such as public networks exposure and multitenant shared infrastructure. The vulnerabilities due to this transition introduce the security breaches and hence cause a threat to the underlying confidential information. The significance of migrating storage services to the cloud environment and the emerging cyber security issues in such a transition are analyzed thoroughly. The proposed framework is intended to support the existing infor...
With the availability of different techniques and solutions, how does one decide whether to stick... more With the availability of different techniques and solutions, how does one decide whether to stick with their current solution or to see if some other solution is even feasible? It is necessary to first look at the current solution, and then to compare it with at least one of other possible solutions. This will either reinforce the belief in the current solution, or it will suggest that another solution would be more beneficial. This paper is to study the awareness of fuzzy systems in Bahrain, along with the acceptance of moving towards another technique, which is fuzzy logic. Also this paper is to propose prototypes to implement the concepts of fuzzy logic for three applications which are: image retrieving, and customer satisfaction
Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector, 2019
Business environment is becoming more complex which creates a big pressure on organizations to in... more Business environment is becoming more complex which creates a big pressure on organizations to increase the performance and decrease the budget and time. Typical management information system failed to reach decision makers' expectations. In order to adapt to the global changes and support decision makers, organizations may implement different solutions and strategies. One of the solutions is to implement business intelligence (BI) in large organizations. The aim of this chapter is to assess the effectiveness of BI solutions and propose a solution for improving knowledge management using BI and cloud computing. A quantitative research method is used which includes survey and interviews. The results will be analyzed to evaluate the current BI solutions in order to identify the problems of knowledge management and decision-making process. Accordingly, a solution will be proposed to overcome the identified problem using cloud BI.
Implementing Computational Intelligence Techniques for Security Systems Design, 2020
Email is the most popular choice of communication due to its low-cost and easy accessibility, whi... more Email is the most popular choice of communication due to its low-cost and easy accessibility, which makes email spam a major issue. Emails can be incorrectly marked by a spam filter and legitimate emails can get lost in the spam folder or the spam emails can deluge the users' inboxes. Therefore, various methods based on statistics and machine learning have been developed to classify emails accurately. In this chapter, the existing spam filtering methods were studied comprehensively, and a spam email classifier based on the genetic algorithm was proposed. The proposed algorithm was successful in achieving high accuracy by reducing the rate of false positives, but at the same time, it also maintained an acceptable rate of false negatives. The proposed algorithm was tested on 2000 emails from the two popular spam datasets, Enron and LingSpam, and the accuracy was found to be nearly 90%. The results showed that the genetic algorithm is an effective method for spam classification and...
Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an esc... more Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an escalating number of cyber-attacks and breaches (Su et al., 2016). ARP-Spoofing attack is one of the Internet security problems that affects IoT devices. Attackers use legitimate ARP packets which traditional detection systems may find it difficult to detect in attacking IoT devices. Therefore, there is a need to have detection systems which use non-traditional approaches in detecting such attacks. This paper presents an artificial intelligence method based on neural networks in detecting ARP-Spoofing in IoT networks. This method showed more than 90% accuracy rate in detecting ARP-Spoofing in IoT networks while it was difficult to detecting ARP-Spoofing with ARIMA statistical method.
Genetic programming is a good technique for finding near-global optimal solutions for complex pro... more Genetic programming is a good technique for finding near-global optimal solutions for complex problems, by finding the program used to solve the problems. One of these complex problems is designing stream cipher systems automatically. Steam cipher is an important encryption technique used to protect private information from an unauthorized access, and it plays an important role in the communication and storage systems. In this work, we propose a new approach for designing stream cipher systems of good properties, such as high degree of security and efficiency. The proposed approach is based on the genetic programming. Three algorithms are presented here, which are simple genetic programming, simulated annealing programming, and adaptive genetic programming. Experiments were performed to study the effectiveness of these algorithms in solving the underlying problem.
Improving Information Security Practices through Computational Intelligence
Computational intelligence (CI) has attracted the attention of many researchers for its effective... more Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.
2011 4th International Conference on Logistics, 2011
ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics ... more ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics (LOGISTIQUA 2011), we would like to welcome you.
Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer ... more Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer neural networks with back propagation to crack a linear stream cipher with LFSR as a key generator, assuming that the cryptanalyst has obtained a finite sequence of known plaintext. ...
2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017
This research is conducted to study the problem of budget allocation for acquisitions in academic... more This research is conducted to study the problem of budget allocation for acquisitions in academic libraries, especially for book collections and how to solve this problem using decision support systems. Several attributes that affect the decision making process have been investigated through the literature review and an interview conducted with the director of the Applied Science University's library which is the subject of this study. After identifying the problem and the attributes affecting the decision making process, a decision support system is proposed. A classification model was used to classify library departments under different management budget allocation classes, using a decision tree classifier.
The main objective of this paper is to propose a cloud based framework handling security issues i... more The main objective of this paper is to propose a cloud based framework handling security issues in the existing data storage systems. There are various cyber security threats to existing storage systems because of their traditional architecture and operations applied on them for managing the data within Bahrain. Migration of local storage services to cloud environment is found to solve numerous related cyber security issues within Bahrain. On the other hand, a number of cyber security vulnerabilities are found to be emerged as a result of this migration such as public networks exposure and multitenant shared infrastructure. The vulnerabilities due to this transition introduce the security breaches and hence cause a threat to the underlying confidential information. The significance of migrating storage services to the cloud environment and the emerging cyber security issues in such a transition are analyzed thoroughly. The proposed framework is intended to support the existing infor...
With the availability of different techniques and solutions, how does one decide whether to stick... more With the availability of different techniques and solutions, how does one decide whether to stick with their current solution or to see if some other solution is even feasible? It is necessary to first look at the current solution, and then to compare it with at least one of other possible solutions. This will either reinforce the belief in the current solution, or it will suggest that another solution would be more beneficial. This paper is to study the awareness of fuzzy systems in Bahrain, along with the acceptance of moving towards another technique, which is fuzzy logic. Also this paper is to propose prototypes to implement the concepts of fuzzy logic for three applications which are: image retrieving, and customer satisfaction
Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector, 2019
Business environment is becoming more complex which creates a big pressure on organizations to in... more Business environment is becoming more complex which creates a big pressure on organizations to increase the performance and decrease the budget and time. Typical management information system failed to reach decision makers' expectations. In order to adapt to the global changes and support decision makers, organizations may implement different solutions and strategies. One of the solutions is to implement business intelligence (BI) in large organizations. The aim of this chapter is to assess the effectiveness of BI solutions and propose a solution for improving knowledge management using BI and cloud computing. A quantitative research method is used which includes survey and interviews. The results will be analyzed to evaluate the current BI solutions in order to identify the problems of knowledge management and decision-making process. Accordingly, a solution will be proposed to overcome the identified problem using cloud BI.
Implementing Computational Intelligence Techniques for Security Systems Design, 2020
Email is the most popular choice of communication due to its low-cost and easy accessibility, whi... more Email is the most popular choice of communication due to its low-cost and easy accessibility, which makes email spam a major issue. Emails can be incorrectly marked by a spam filter and legitimate emails can get lost in the spam folder or the spam emails can deluge the users' inboxes. Therefore, various methods based on statistics and machine learning have been developed to classify emails accurately. In this chapter, the existing spam filtering methods were studied comprehensively, and a spam email classifier based on the genetic algorithm was proposed. The proposed algorithm was successful in achieving high accuracy by reducing the rate of false positives, but at the same time, it also maintained an acceptable rate of false negatives. The proposed algorithm was tested on 2000 emails from the two popular spam datasets, Enron and LingSpam, and the accuracy was found to be nearly 90%. The results showed that the genetic algorithm is an effective method for spam classification and...
Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an esc... more Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an escalating number of cyber-attacks and breaches (Su et al., 2016). ARP-Spoofing attack is one of the Internet security problems that affects IoT devices. Attackers use legitimate ARP packets which traditional detection systems may find it difficult to detect in attacking IoT devices. Therefore, there is a need to have detection systems which use non-traditional approaches in detecting such attacks. This paper presents an artificial intelligence method based on neural networks in detecting ARP-Spoofing in IoT networks. This method showed more than 90% accuracy rate in detecting ARP-Spoofing in IoT networks while it was difficult to detecting ARP-Spoofing with ARIMA statistical method.
Genetic programming is a good technique for finding near-global optimal solutions for complex pro... more Genetic programming is a good technique for finding near-global optimal solutions for complex problems, by finding the program used to solve the problems. One of these complex problems is designing stream cipher systems automatically. Steam cipher is an important encryption technique used to protect private information from an unauthorized access, and it plays an important role in the communication and storage systems. In this work, we propose a new approach for designing stream cipher systems of good properties, such as high degree of security and efficiency. The proposed approach is based on the genetic programming. Three algorithms are presented here, which are simple genetic programming, simulated annealing programming, and adaptive genetic programming. Experiments were performed to study the effectiveness of these algorithms in solving the underlying problem.
Improving Information Security Practices through Computational Intelligence
Computational intelligence (CI) has attracted the attention of many researchers for its effective... more Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.
Uploads
Papers by wasan awad