اختيار الموقع            تسجيل دخول
 

Mansoura journal for computer and information sciences /
بيانات الدورية
أعداد قيد الطبع
اعداد الدورية
  Mansoura journal for computer and information sciences /
  
 

[9003011.] رقم البحث : 9003011 -
Enhanced Algorithms for Counting Rectangles in Large Bipartite Graphs using MapReduce /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 6
  Ahmed T. Sharafeldeen ( ahmed.taher@mans.edu.eg - ) - مؤلف رئيسي
  Mohammed F. Alrahmawy ( mrahmawy@mans.edu.eg - )
  Samir Elmougy ( mougy@mans.edu.eg - )
  Rectangle Counting; Bipartite Graph; MapReduce; Large-Scale Graph Analysis.
  Rectangles for bipartite graphs are like triangles for unipartite graphs as both represent the smallest cycles in such graphs. Rectangle Counting is considered an important task in many bipartite network analysis metrics and is considered the core of computing such metrics, especially in cluster coefficient, bitruss, etc. However, there are few efficient algorithms to deal with this problem, especially in a large bipartite graph. In this work, we use MapReduce to enhance an algorithm to count rectangles in a large bipartite graph. The results show that our proposed MapReduce-based algorithm gives a better execution time than the existing algorithms, especially when it is applied in very large bipartite graphs
  Download Paper

[9003012.] رقم البحث : 9003012 -
Enhanced Security of the Internet of Medical Things (IOMT) /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 10
  I.S.Farahat ( Hema_shwky@yahoo.com - ) - مؤلف رئيسي
  A.S.Tolba ( ast@astolba.com - )
  Waleed Eladrosy ( waleed_cs2000@yahoo.com - )
  Internet of medical things (IoMT), threats and attacks, security, encoding, decoding, encryption, decryption and authentication.
  Healthcare is the major problem that faces the individuals around the world especially oldsters and disables. The development of the object to object technology (Internet of things (IoT)) is improved until it can be used to overcome the healthcare problem. The progress of the IoT extends to help the science in remote healthcare and predict the disease of the patients before it happened. But with these improvements the patient data become in danger because the patient data are sent from patient side over the internet to the physician so it becomes available for any attackers to attack the data and modified or stolen it in its way to the doctor or to the patient. So the healthcare field is having a security and privacy issue. This paper introduces system that can solve this problem by changing the data before it leaves the patient. So the transfer data is secured enough to protect the patients’ data. The proposed system using a three technique one for encoding data to change the shape of data and compressed it and one technique for encrypt encoded data with AES but with rotated key and last one for make an authentication mechanism to protect data from output access and permit any person that have username and password credential to access patient’s data. The authentication mechanism is built at the website with a private IP the proposed system is developed with low cost hardware to minimize the cost of the product with high efficiency.
  Download Paper

[9003013.] رقم البحث : 9003013 -
Software and Hardware Implementation of Local Intrusion Detection Strategy /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 8
  Imad I. Saada ( sir_ias@hotmail.com - ) - مؤلف رئيسي
  Rasha H. Sakr ( yssf_hamid@yahoo.com - )
  Majdi Z. Rashad ( magdi_z2011@yahoo.com - )
  MANET, Intrusion, Black Hole, MANET security.
  A mobile ad hoc network (MANET) has many undesirable challenges, black hole (BH) is one of the most significant challenges in MANET. Many researchers have proposed researches which depend on different strategies to face this challenge. The problem is how much the ability of these strategies to detect and block BH in order to empty the network from the threats, and how much these solutions could be implemented practically to treat with threats. However, the required strategy should also maintain network performance at the same time. The idea of this research has been applied on AODV based MANET, the strategy deals with cooperative black hole by using a deceptive message with virtual address that is not in the addresses range [1]. The main interest in this paper beside proposing the new idea, is to convert this idea into strategy by providing the necessary details, in addition to implement the strategy by hardware and software models. These models have been built in order to illustrate how black hole works and how the strategy can detect and block the black hole practically in AODV based MANET. This paper presents the method in an integrated manner. In this method, the detection process starts from the previous node, not from the source node. However, this method can choose the shortest path and can deal with more than one black hole. These additions will preserve the performance of network, the hardware model has been provided with liquid crystal displays LCD put on each node. LCD is used to appear each step, and to make the system full-acknowledgment
  Download Paper

[9003014.] رقم البحث : 9003014 -
An Enhanced Real-Time Shadow Rendering Technique in Outdoor Augmented Reality /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 8
  Naira Elazab ( naira.elazab@gmail.com - ) - مؤلف رئيسي
  Nagham Mekky ( nona762005@hotmail.com - )
  Ahmed Atwan ( atwan4@gmail.com - )
  Hassan Soliman ( hsoliman@mans.edu.eg - )
  Augment Reality (AR), overlapping shadow, sun position, and real-time shadow.
  In this paper, the point is to give steady shadows amongst virtual and genuine objects for outdoor scene without requiring any earlier data. The technique gives a real-time framework for recreating reliable virtual shadows in an outdoor scene. The proposed procedure firstly handles the shadow areas because of genuine things; secondly ensures the pixels in genuine shadow are prevented from more rendering and finally rendering shadows because of virtual things. The main research contribution, in addition to shadow refinement, is handling the overlap between real and virtual shadows. Consequently those shadows for virtual things are depend on the shadows of real things. The experimental results create the impression that the recommended system has basically upgraded that authenticity about steady outside augmented reality rendering, in this manner taking care of the issue of practical augmented reality frameworks. Results show a comparison of shadow rendering between proposed technique and other techniques in different resolutions.
  Download Paper

[9003015.] رقم البحث : 9003015 -
A new strategy for mobility prediction in the PCS network /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 11
  Abeer M. Hekal ( Bero.hekal@gmail.com - ) - مؤلف رئيسي
  Ahmed I. Saleh ( aisaleh@yahoo.com - )
  MagdiZakria ( magdi_z2011@yahoo.com - )
  PCS network, Mobility prediction, Ant-based system, Association rules.
  Mobility prediction is one of the main challenges that faced Personal Communication Service (PCS) network. It is probable for many users to move among cells (coverage areas) during their calls. Therefore, the network needs to predict their next location in order to reserve another resource in that next cell to keep their calls going on. In this paper, a new strategy is proposed for mobility prediction named Mixed Mobility Prediction (MMP). It is composed of two predictors. The first one is named Association Rules Predictor (ARP), and the second one is called Weighted Ant Colony Predictor (WACP). In ARP the prediction is based on Association rules in data mining and detecting the time of calls. In WACP the prediction is based on Ant Colony (AC) in swarm intelligence. In addition to that, roads lead to their predicted next locations, and priority of famous places found in those locations. Finally, MMP merges the decisions of both predictors to get the final accurate decision in the absence of sufficient history for a MT. The proposed approach outperformed the compared the state-of-arts methods in terms of; Prediction Accuracy (PA), and Quality of Measure (QM).
  Download Paper

[9003016.] رقم البحث : 9003016 -
A Hybrid Approach for Automatic Morphological Diacritizationof Arabic Text /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 8
  Hatem M Noaman ( hatemnoaman@yahoo.com - ) - مؤلف رئيسي
  Shahenda S. Sarhan ( shahenda_sarhan@yahoo.com - )
  M. A. A. Rashwan ( mrashwan@RDI-eg.com - )
  Arabic Natural Language Processing ; Automatic Morphological Diacritization; deep encode-decode recurrent neural networks.
  Arabic Modern texts are commonly written without diacritization, which is a critical task for other Arabic processing tasks as word sense disambiguation, automatic speech recognition, and text to speech, where word meaning or pronunciation is decided based on the diacritic signs assigned to each letter.
This paper presents a novel approach for automatic Arabic text diacritization using deep encode-decode recurrent neural networks that is followed by several text correction techniques, to improve the overall system output accuracy. Experimental results of the proposed system on Wikinews test set show superior performance and are competitive with those of the-state-of-the-art diacritization methods. Namely, our method achieves morphological diacritization Word Error Rate (WER) 3.85% and Diacritic Error Rate (DER) 1.12%.
  Download Paper

[9003017.] رقم البحث : 9003017 -
Improving DNA Computing through CRISPR based Model and Visual DNA Tool /
تخصص البحث :
  Mansoura journal for computer and information sciences / / Vol.14 - No.2
  تاريخ تقديم البحث 10/07/2019
  تاريخ قبول البحث 10/07/2019
  عدد صفحات البحث 10
  A.M. El-Edkawy ( amr.eledkawy@mans.edu.eg - ) - مؤلف رئيسي
  M.A. El-Dosuky ( mouh_sal_010@mans.edu.eg - )
  Taher Hamza ( taher_hamza@yahoo.com - )
  Accepting Hybrid Network of Evolutionary Processors, CRISPR, DNA Computing, NP, PSPACE, Visual DNA, HPP.
  Since the advent of DNA computing field; there’s debate about its ability to solve hard computational problems. A way to deal with the debate is to design a computational model for DNA computing and then studying its complexity power. The main contribution of this paper is to propose a DNA computing model that presents a usage of CRISPR in DNA computing field. The model has three basic operations which are merge, CRISPR and detect. The model is argued to be robust, as the three operations are robust, and to be the minimum model for DNA computing in terms of the number of operations. The proposed model has corresponded with a model inspired from the evolution of DNA sequences called Accepting Hybrid Network of Evolutionary Processors (AHNEPs). Based on that correspondence, the proposed model can be used to solve NP problems in polynomial time and PSPACE problems in polynomial space. The model is used to solve, the NP problem, the Hamiltonian Path Problem (HPP) in linear time. The limitations of DNA computing area could be avoided within the model. Also, the study presents “Visual DNA” which is a software that can simulate biochemical operations in DNA computing. Also, the software can make analysis for DNA sequences. So this simulation software will offer a useful tool for the DNA computing implementation because it will help in the analysis of input DNA sequences and in the prediction of output DNA sequences which would be helpful to avoid errors during the experimental process.
  Download Paper

 


Powered by Future Library Software.All rights reserved © CITC - Mansoura University. Sponsored by Mansoura University Privacy Policy