World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Dec 23, 2015
Cloud computing has been one of the fastest growing components of the IT industry. It altered the... more Cloud computing has been one of the fastest growing components of the IT industry. It altered the future of the web by having computing, communication, and storage provides as services to internet users. Mobile Cloud Computing (MCC) is currently gaining steam as an extension to cloud computing as it delivers a large variety of cloud application to billions of smartphones and wearable devices. This paper studies reliability for MCC by determining the ability of a system component to function correctly under different scenarios for a specified period of time. Our aim is to be able to estimate and manage uncertainty and risks of failure. The assessment procedures consist of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we present here several factors with significant impact on the overall cloud system reliability that should be taken into account in order to deliver highly available cloud computing services for mobile consumers.
International Journal of Computer Science and Mobile Computing
Multilabel emotion classification is a high priority because it mimics real-life scenarios in whi... more Multilabel emotion classification is a high priority because it mimics real-life scenarios in which people display a variety of emotions. The text could express a collection of emotions such as happiness, love, and optimism, or sadness, anger, and pessimism. In this framework, the Arabic tweets data provided by SemEval 2018-Task1, E-c subtask have been first preprocessed through different normalization steps, including stemming, stop word removal, special characters, and digits removal. An emotion lexicon has been built to replace the emotions with their meaning related to emotion classes. A word embedding pre-trained model Aravec has been implemented for the feature extraction process because word embedding performed better in this task than other features such as the N-gram model. In the classification process of our framework, different machine learning techniques have been implemented, including Multi-Layer Perceptron (MLP), Support Vector Machine SVM, K Nearest Neighbor (KNN), ...
Breast cancer is a gigantic burden on humanity, causing the loss of enormous numbers of lives and... more Breast cancer is a gigantic burden on humanity, causing the loss of enormous numbers of lives and amounts of money. It is the world’s leading type of cancer among women and a leading cause of mortality and morbidity. The histopathological examination of breast tissue biopsies is the gold standard for diagnosis. In this paper, a computer-aided diagnosis (CAD) system based on deep learning is developed to ease the pathologist’s mission. For this target, five pre-trained convolutional neural network (CNN) models are analyzed and tested—Xception, DenseNet201, InceptionResNetV2, VGG19, and ResNet152—with the help of data augmentation techniques, and a new approach is introduced for transfer learning. These models are trained and tested with histopathological images obtained from the BreakHis dataset. Multiple experiments are performed to analyze the performance of these models through carrying out magnification-dependent and magnification-independent binary and eight-class classification...
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
Cloud bursting is the process of integrating public cloud resources along with internal IT infras... more Cloud bursting is the process of integrating public cloud resources along with internal IT infrastructure. In this paper, a new cloud bursting framework named “Platypus” is introduced mainly to resolve some of the unresolved issues in cloud bursting. Unfortunately, there is no comprehensive approach for treating the problems of cloud bursting. Most researchers try to tackle one of the aspects of cloud bursting process by suggesting frameworks or through reusing certain techniques to enhance the throughput. On the other hand, Platypus framework achieves the utter ratio of applying the precopying technique and supporting the automation procedures of implementing the cloud bursting approach. In addition, experimental studies based on real values from AWS has been conducted for applying this new framework, and the framework succeeds in answering the question “which application will be precopied and consequently bursted to the cloud?” Moreover, it achieves the trade-off between the time saving and the cost reduction.
The IoT solutions for health informatics are suffering from restriction of using one frequency wh... more The IoT solutions for health informatics are suffering from restriction of using one frequency which makes the network is unable to communicate via different frequencies. Also, this limitation of using a single frequency fixes a single communication range between nodes without the capability to vary the covering rang. This could consume high power if the system has to transmit data on long distance due to the need to use signal repeater node/s. This paper reports the development of a new heterogeneous design of IoT network via unsymmetrical frequencies in order to sense, process, exchange and visualize two vital signs. The sensing and processing phases are performed via a convenient design of noninvasive vital data acquisition nods. These data acquisition nodes of vital signs are integrated into an embedded system with the IoT nodes in order to provide effective, accurate and real-time health monitoring for vital signs. The design of IoT broker node enables real-time analysis and co...
Vehicular Cloud Computing (VCC) is an emerging technology that vehicle drivers use for different ... more Vehicular Cloud Computing (VCC) is an emerging technology that vehicle drivers use for different applications. VCC applications include Location-Based Service (LBS) applications, which require from the vehicles to send frequent location updates to LBS Providers for real-time services. Unfortunately, this may lead to tracking and identification of drivers, and so breaching their privacy. In this paper, we propose a secure architecture for Vehicular Cloud Computing, called CARCLOUD, in order to solve the previous problems. Our proposed system consists of four main phases: Vehicle Bootstrapping Phase, Vehicle and LBS Provider Certificate Provisioning Phase, Vehicle and LBS Provider Certificate Revocation Phase, and finally the LBS Request in Vehicular Cloud Computing Phase. In our system, we use a novel idea that allows a Road-Side Unit (RSU) to form cluster containing all vehicles within its coverage range, and to act as the Cluster Head of cluster formed. Also, we introduce to use RS...
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
Cloud computing combines a huge number of virtual resources and presents flexible service to user... more Cloud computing combines a huge number of virtual resources and presents flexible service to users by pay-as-you-need concept. However, cloud computing has many advantages like resource sharing and conjunction; also still there are some problems such as data security which is one of the critical factors in cloud environment. This paper proposed security model to protect cloud data from unauthorized access using cryptography and steganography. This model consist of three phases, in the first phase we hash data using Secure Hash Algorithm (SHA), Then encrypt data using Advanced Encryption Standard (AES) algorithm and encrypt the hash code and the new key by Public key cryptography. Finally we use Least Significant Bit (LSB) steganography to embed all information after encryption in any type of images.
2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES), 2021
Deployment on different platforms has been a great issue for mobile companies that aim to maximiz... more Deployment on different platforms has been a great issue for mobile companies that aim to maximize the return on investments by making their mobile applications available on different mobile platforms. Consequently, the app may be developed several times to match different platforms. Therefore, there is a need to have solutions that enable the developers to develop the app once, and run it everywhere to reduce the cost of development and reach out to maximum users across several platforms. In this paper a tool is provided with the most popular languages /frameworks (native, cross platform) based on their market share to select the desired framework among them to code with, get the developed application written in the target language that meets their business requirements, and give the ability to convert native application to cross platform one. A trans-compiler based solution is introduced to convert the UI and UI-related backend code of application from a set of languages to any other language in the set and ability of adding more languages and frameworks in the future to achieve the concept of generalization of code conversion.
Currently, expressing feelings through social media requires great consideration as an essential ... more Currently, expressing feelings through social media requires great consideration as an essential part of our lives; besides sharing ideas and thoughts, we share moments and good memories. Social media such as Facebook, Twitter, Weibo, and LinkedIn, are considered rich sources of opinionated text data. Both organizations and individuals are interested in using social media to analyze people's opinions and extract sentiments and emotions. Most studies on social media analysis mainly classified sentiment as positive, negative, or neutral classes. The challenge in emotion analysis arises because humans can express one or several emotions within one expression. Human beings can recognize these different emotions well; however, it is still not easy for an emotion analysis system. In most cases, the Arabic language used through social media is of a slangy or colloquial form, making it more challenging to preprocess and filter noise since most lemmatization and stemming tools are built ...
2019 14th International Conference on Computer Engineering and Systems (ICCES), 2019
Cryptography and cryptographic primitives are widely considered to be the most important fundamen... more Cryptography and cryptographic primitives are widely considered to be the most important fundamental of blockchain that provide secure and anonymity guaranteed decentralized solutions. In the history of papers study cryptographic primitives used in blockchain, the focus has always been in the use cases of blockchain in different aspects of industry, example health care, IoT, information security, consensus building systems and some other fields. To the best of our knowledge, current cryptography techniques used in blockchain, or still theoretical but the security proof can be proven under certain security assumption, so can be used in blockchain has gathered numerous awareness in the last five years. In this paper, we fully review and analysis some cryptographic techniques used in designing a distributed consensus protocol that is efficient, decentralized, and flexible as a framework which are already used in blockchain. Take in consideration deploying a permissioned consensus like delegated proof-of-stack (DPoS) in the decentralized IOT applications is hard. The IOT systems needs to consider a larger data size and a larger span deployment. With this in mind we point to the special challenge for the IOT applications related to blockchain. Several modern cryptography techniques have been adopted to enhance the consensus process with respect to the computational overhead vs communication overhead and storage cost. Additionally, we re-examine non-interactive signature and public key aggregation in digital signature on different messages types and present a change in the aggregation scheme, as far as we know this is the first time that pairing become more faster in verify signatures, and to enable more transaction in the block.
2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016
Cloud computing creates new business opportunity for small, medium or even large size companies, ... more Cloud computing creates new business opportunity for small, medium or even large size companies, as it eliminates the need of investing in a huge datacenter in order to operate the environment. The contract between the cloud service provider (CSP) and the lessee is called service level agreement (SLA), which guarantee the quality of service (QoS) that should be fulfilled from the CSP to the lessee. The problem is that an over utilized node may result to SLA violation; However, virtual machine (VM) migration from utilized node to unutilized node or a node in power saving mode can decrease the SLA violation percentage, but potentially increase the cloud's power consumption. Our proposed solution is to automatically modify the number of nodes in each cluster, to find the optimum cluster size based on the current SLA violation percentage, and to be an extension to our previously proposed adaptive power panel, in which the cloud's datacenter is divided into clusters, where different VM migration policies are applied.
International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.
Page 1. A GENERAL ARCHITECTURE OF STUDENT MODELTO ASSESS THE LEARNING PERFORMANCE IN INTELLIGENT ... more Page 1. A GENERAL ARCHITECTURE OF STUDENT MODELTO ASSESS THE LEARNING PERFORMANCE IN INTELLIGENT TUTORING SYSTEMS Dr. Hassan S. Bedor, Dr. Hoda K. Mohamed Ain Shams University, Faculty ...
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Dec 23, 2015
Cloud computing has been one of the fastest growing components of the IT industry. It altered the... more Cloud computing has been one of the fastest growing components of the IT industry. It altered the future of the web by having computing, communication, and storage provides as services to internet users. Mobile Cloud Computing (MCC) is currently gaining steam as an extension to cloud computing as it delivers a large variety of cloud application to billions of smartphones and wearable devices. This paper studies reliability for MCC by determining the ability of a system component to function correctly under different scenarios for a specified period of time. Our aim is to be able to estimate and manage uncertainty and risks of failure. The assessment procedures consist of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we present here several factors with significant impact on the overall cloud system reliability that should be taken into account in order to deliver highly available cloud computing services for mobile consumers.
International Journal of Computer Science and Mobile Computing
Multilabel emotion classification is a high priority because it mimics real-life scenarios in whi... more Multilabel emotion classification is a high priority because it mimics real-life scenarios in which people display a variety of emotions. The text could express a collection of emotions such as happiness, love, and optimism, or sadness, anger, and pessimism. In this framework, the Arabic tweets data provided by SemEval 2018-Task1, E-c subtask have been first preprocessed through different normalization steps, including stemming, stop word removal, special characters, and digits removal. An emotion lexicon has been built to replace the emotions with their meaning related to emotion classes. A word embedding pre-trained model Aravec has been implemented for the feature extraction process because word embedding performed better in this task than other features such as the N-gram model. In the classification process of our framework, different machine learning techniques have been implemented, including Multi-Layer Perceptron (MLP), Support Vector Machine SVM, K Nearest Neighbor (KNN), ...
Breast cancer is a gigantic burden on humanity, causing the loss of enormous numbers of lives and... more Breast cancer is a gigantic burden on humanity, causing the loss of enormous numbers of lives and amounts of money. It is the world’s leading type of cancer among women and a leading cause of mortality and morbidity. The histopathological examination of breast tissue biopsies is the gold standard for diagnosis. In this paper, a computer-aided diagnosis (CAD) system based on deep learning is developed to ease the pathologist’s mission. For this target, five pre-trained convolutional neural network (CNN) models are analyzed and tested—Xception, DenseNet201, InceptionResNetV2, VGG19, and ResNet152—with the help of data augmentation techniques, and a new approach is introduced for transfer learning. These models are trained and tested with histopathological images obtained from the BreakHis dataset. Multiple experiments are performed to analyze the performance of these models through carrying out magnification-dependent and magnification-independent binary and eight-class classification...
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
Cloud bursting is the process of integrating public cloud resources along with internal IT infras... more Cloud bursting is the process of integrating public cloud resources along with internal IT infrastructure. In this paper, a new cloud bursting framework named “Platypus” is introduced mainly to resolve some of the unresolved issues in cloud bursting. Unfortunately, there is no comprehensive approach for treating the problems of cloud bursting. Most researchers try to tackle one of the aspects of cloud bursting process by suggesting frameworks or through reusing certain techniques to enhance the throughput. On the other hand, Platypus framework achieves the utter ratio of applying the precopying technique and supporting the automation procedures of implementing the cloud bursting approach. In addition, experimental studies based on real values from AWS has been conducted for applying this new framework, and the framework succeeds in answering the question “which application will be precopied and consequently bursted to the cloud?” Moreover, it achieves the trade-off between the time saving and the cost reduction.
The IoT solutions for health informatics are suffering from restriction of using one frequency wh... more The IoT solutions for health informatics are suffering from restriction of using one frequency which makes the network is unable to communicate via different frequencies. Also, this limitation of using a single frequency fixes a single communication range between nodes without the capability to vary the covering rang. This could consume high power if the system has to transmit data on long distance due to the need to use signal repeater node/s. This paper reports the development of a new heterogeneous design of IoT network via unsymmetrical frequencies in order to sense, process, exchange and visualize two vital signs. The sensing and processing phases are performed via a convenient design of noninvasive vital data acquisition nods. These data acquisition nodes of vital signs are integrated into an embedded system with the IoT nodes in order to provide effective, accurate and real-time health monitoring for vital signs. The design of IoT broker node enables real-time analysis and co...
Vehicular Cloud Computing (VCC) is an emerging technology that vehicle drivers use for different ... more Vehicular Cloud Computing (VCC) is an emerging technology that vehicle drivers use for different applications. VCC applications include Location-Based Service (LBS) applications, which require from the vehicles to send frequent location updates to LBS Providers for real-time services. Unfortunately, this may lead to tracking and identification of drivers, and so breaching their privacy. In this paper, we propose a secure architecture for Vehicular Cloud Computing, called CARCLOUD, in order to solve the previous problems. Our proposed system consists of four main phases: Vehicle Bootstrapping Phase, Vehicle and LBS Provider Certificate Provisioning Phase, Vehicle and LBS Provider Certificate Revocation Phase, and finally the LBS Request in Vehicular Cloud Computing Phase. In our system, we use a novel idea that allows a Road-Side Unit (RSU) to form cluster containing all vehicles within its coverage range, and to act as the Cluster Head of cluster formed. Also, we introduce to use RS...
2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
Cloud computing combines a huge number of virtual resources and presents flexible service to user... more Cloud computing combines a huge number of virtual resources and presents flexible service to users by pay-as-you-need concept. However, cloud computing has many advantages like resource sharing and conjunction; also still there are some problems such as data security which is one of the critical factors in cloud environment. This paper proposed security model to protect cloud data from unauthorized access using cryptography and steganography. This model consist of three phases, in the first phase we hash data using Secure Hash Algorithm (SHA), Then encrypt data using Advanced Encryption Standard (AES) algorithm and encrypt the hash code and the new key by Public key cryptography. Finally we use Least Significant Bit (LSB) steganography to embed all information after encryption in any type of images.
2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES), 2021
Deployment on different platforms has been a great issue for mobile companies that aim to maximiz... more Deployment on different platforms has been a great issue for mobile companies that aim to maximize the return on investments by making their mobile applications available on different mobile platforms. Consequently, the app may be developed several times to match different platforms. Therefore, there is a need to have solutions that enable the developers to develop the app once, and run it everywhere to reduce the cost of development and reach out to maximum users across several platforms. In this paper a tool is provided with the most popular languages /frameworks (native, cross platform) based on their market share to select the desired framework among them to code with, get the developed application written in the target language that meets their business requirements, and give the ability to convert native application to cross platform one. A trans-compiler based solution is introduced to convert the UI and UI-related backend code of application from a set of languages to any other language in the set and ability of adding more languages and frameworks in the future to achieve the concept of generalization of code conversion.
Currently, expressing feelings through social media requires great consideration as an essential ... more Currently, expressing feelings through social media requires great consideration as an essential part of our lives; besides sharing ideas and thoughts, we share moments and good memories. Social media such as Facebook, Twitter, Weibo, and LinkedIn, are considered rich sources of opinionated text data. Both organizations and individuals are interested in using social media to analyze people's opinions and extract sentiments and emotions. Most studies on social media analysis mainly classified sentiment as positive, negative, or neutral classes. The challenge in emotion analysis arises because humans can express one or several emotions within one expression. Human beings can recognize these different emotions well; however, it is still not easy for an emotion analysis system. In most cases, the Arabic language used through social media is of a slangy or colloquial form, making it more challenging to preprocess and filter noise since most lemmatization and stemming tools are built ...
2019 14th International Conference on Computer Engineering and Systems (ICCES), 2019
Cryptography and cryptographic primitives are widely considered to be the most important fundamen... more Cryptography and cryptographic primitives are widely considered to be the most important fundamental of blockchain that provide secure and anonymity guaranteed decentralized solutions. In the history of papers study cryptographic primitives used in blockchain, the focus has always been in the use cases of blockchain in different aspects of industry, example health care, IoT, information security, consensus building systems and some other fields. To the best of our knowledge, current cryptography techniques used in blockchain, or still theoretical but the security proof can be proven under certain security assumption, so can be used in blockchain has gathered numerous awareness in the last five years. In this paper, we fully review and analysis some cryptographic techniques used in designing a distributed consensus protocol that is efficient, decentralized, and flexible as a framework which are already used in blockchain. Take in consideration deploying a permissioned consensus like delegated proof-of-stack (DPoS) in the decentralized IOT applications is hard. The IOT systems needs to consider a larger data size and a larger span deployment. With this in mind we point to the special challenge for the IOT applications related to blockchain. Several modern cryptography techniques have been adopted to enhance the consensus process with respect to the computational overhead vs communication overhead and storage cost. Additionally, we re-examine non-interactive signature and public key aggregation in digital signature on different messages types and present a change in the aggregation scheme, as far as we know this is the first time that pairing become more faster in verify signatures, and to enable more transaction in the block.
2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016
Cloud computing creates new business opportunity for small, medium or even large size companies, ... more Cloud computing creates new business opportunity for small, medium or even large size companies, as it eliminates the need of investing in a huge datacenter in order to operate the environment. The contract between the cloud service provider (CSP) and the lessee is called service level agreement (SLA), which guarantee the quality of service (QoS) that should be fulfilled from the CSP to the lessee. The problem is that an over utilized node may result to SLA violation; However, virtual machine (VM) migration from utilized node to unutilized node or a node in power saving mode can decrease the SLA violation percentage, but potentially increase the cloud's power consumption. Our proposed solution is to automatically modify the number of nodes in each cluster, to find the optimum cluster size based on the current SLA violation percentage, and to be an extension to our previously proposed adaptive power panel, in which the cloud's datacenter is divided into clusters, where different VM migration policies are applied.
International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.
Page 1. A GENERAL ARCHITECTURE OF STUDENT MODELTO ASSESS THE LEARNING PERFORMANCE IN INTELLIGENT ... more Page 1. A GENERAL ARCHITECTURE OF STUDENT MODELTO ASSESS THE LEARNING PERFORMANCE IN INTELLIGENT TUTORING SYSTEMS Dr. Hassan S. Bedor, Dr. Hoda K. Mohamed Ain Shams University, Faculty ...
Uploads
Papers by Hoda Mohammed