{"title":"Using Blockchain Technology in MANETs Security","authors":"Ahmed Said Abdel-Sattar, Marianne A. Azer","doi":"10.1109/MIUCC55081.2022.9781696","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781696","url":null,"abstract":"Many systems have recently begun to examine blockchain qualities in order to create cooperation enforcement methods. This paper provides a complete and extensive evaluation of work on multi-hop MANETs with blockchain-based trust control between nodes. We contextualize the snag of security in MANETs resulting from the lack of trust between the participating nodes. We present the blockchain concepts and discuss the limitation of the current blockchain in MANETs. We review the promising proposed ideas in the state-of-the-art based on research papers. Finally, we discuss and summarize strategies and challenges for further research.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karim Yasser, Amr Mohamed Salama, Ahmed Amr, Loay Eldin Yehia, Samira Refaat, F. H. Ismail
{"title":"Egyart_classify: an approach to classify outpainted Egyptian monuments images using GAN and ResNet","authors":"Karim Yasser, Amr Mohamed Salama, Ahmed Amr, Loay Eldin Yehia, Samira Refaat, F. H. Ismail","doi":"10.1109/MIUCC55081.2022.9781780","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781780","url":null,"abstract":"Since Egypt is the cradle of civilizations, it contains many monuments and historical places. Tourist guides need the help of machine learning techniques to aid foreigners in getting to know Egypt's great history. This paper introduces a system to recognize monuments and provides a detailed description. A significant challenge is tackled in this paper, which is recognizing cropped monuments. When a tourist captures a monument image in real life, it may be occluded by an object. The human brain fills in the blanks and completes the image automatically. Our main contribution is to use generative adversarial deep learning techniques (GAN) to outpaint the cropped image. The outpainted image is then fed into state of art classifier RESNET to classify the monument and show a detailed explanation of its remarkable history. We trained the system with a dataset collected by the team of authors. After 1000 epochs of training, the Adversarial Loss of training GAN is 0.28344184 and the validation loss is 0.30181705. The performance measures of the RESNET classifier in testing are 97.0% for accuracy, 97.1% for precision, 97.0% for recall, and 97.0% for F1-measure.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdel-Fatah Karam, AbdelMoneim Helmy, Ammar Mohammed
{"title":"An approach to enhance KNN based on data clustering using K-medoid","authors":"Abdel-Fatah Karam, AbdelMoneim Helmy, Ammar Mohammed","doi":"10.1109/MIUCC55081.2022.9781724","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781724","url":null,"abstract":"K-nearest-neighbor (KNN) is one of the state-of-the-art machine learning algorithms used for classification and regression tasks. In addition to being simple to understand, KNN is also versatile, spanning various applications. Despite its simplicity, it is considered a lazy classifier that does not generate a trained model but stores or memorizes training examples instead. Consequently, the prediction process using KNN becomes costly in resources and time, especially when the dataset becomes large. Also, there is no general way to choose the best distance metric during the prediction. This paper proposes a new algorithm called K-nearest Medoid KNN (KMKNN) which improves the performance of KNN in terms of prediction performance and time efficiency without a major effect on its result accuracy. The core idea of the proposed KMKNN is to cluster the dataset before the prediction to limit the distance measures to those data instances that belong to the nearest cluster of the new data. KMKNN when compared to the traditional KNN and other similar extended versions of KNN, achieves a noticeable improvement on 15 benchmark datasets. The importance of this work is primarily in large datasets or when the distance measure used is computationally expensive, which is common in the computer vision and pattern recognition domains.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DevSecOps: A Security Model for Infrastructure as Code Over the Cloud","authors":"Amr Ibrahim, A. Yousef, Walaa Medhat","doi":"10.1109/MIUCC55081.2022.9781709","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781709","url":null,"abstract":"DevSecOps includes security practice while applying DevOps. DevSecOps help secure the whole DevOps process. This paper aims to define a DevSecOps module to be used by the infrastructure team while applying infrastructure as code. The proposed module solves the problem of security by including security practice with the DevOps cycle to reach DevSecOps. The module was tested to measure time effi-ciency. A small survey was created to test other DevSecOps metrics and enhance future work.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Ensemble Voting Model for Fake News Detection","authors":"Sherry Girgis, Eslam Amer","doi":"10.1109/MIUCC55081.2022.9781788","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781788","url":null,"abstract":"Fake news or rumors are a phenomenon that significantly influences our social lives. Politicians in the political world usually rely on fake news as a powerful mechanism to change public opinion. Fake news spread through the media poses a real threat to the credibility of information, and the detection of fake news has attracted increased attention in recent years. Therefore, it becomes highly necessary to develop a method to identify fake news. This paper proposes a new ensemble voting model for detecting fake news in online text using a hybrid of machine learning and deep learning algorithms. Our ensemble model consists of three algorithms, namely, Convolution Neural Network (CNN) Gated Recurrent Unit (GRU) model of Recurrent Neural Network (RNN) and Random Forest. We relied on Natural language processing to extract statistical and representative features from the LIAR dataset. We experimented with the extracted features with our ensemble model. Experimental evaluation showed that our model achieves the best performance on the LIAR dataset with an accuracy of 0.410.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Badr Tarek Mohamed, Aml Mohamed Ahmed, A. A. Ahmed, Yasser Kamal Omar, Abdullah Medhat Makram, Khloud Khaled Fouad, Ayman Ahmed Soliman, Ahmed Mogahed Abo-Elmagd
{"title":"Smart Hydroponie System Using Fuzzy Logic Control","authors":"Badr Tarek Mohamed, Aml Mohamed Ahmed, A. A. Ahmed, Yasser Kamal Omar, Abdullah Medhat Makram, Khloud Khaled Fouad, Ayman Ahmed Soliman, Ahmed Mogahed Abo-Elmagd","doi":"10.1109/MIUCC55081.2022.9781654","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781654","url":null,"abstract":"Hydroponie plant plays a critical role in the agriculture field, which is put forward as a solution to combat climate change. The paper aims to provide automatic monitoring and controlling of hydroponic plants in the greenhouse via smartphones in real-time, to reduce the problems that appear in the greenhouse system and help the farmers in the agriculture process as they still do it manually. The paper will use the nutrient film technique (NFT), the nutrient solution is diluted with the water until getting the concentration for the cultivated plant, and then the excess solution is returned to the tank and watered the plant again. The proposed model will do activities such as measuring the temperature, humidity, and water level in the plant. The system design is based on fuzzy logic, the main objective of using fuzzy logic is to develop automated precise control of the fan and water pump. The proposed model hardware is an Arduino microcontroller, dHT11 sensor, PH sensor, LDR, esp8266 Wi-Fi module, MQ135, water level, fan with 5V, micro-DC water pump, and buzzer. The back end's main functions are to control actuators, provide real-time notifications of the sensor values, and user authentication. The test result of the proposed model is displaying the status of the plant and doing an action, such as controlling fan levels, water pump, and determining the amount of PH needed for the plant. The paper will be organized as the following: first, the background, then related work that is based on the same idea, a proposed model that includes hardware, backend, user interface, and the fuzzy logic system, the paper will end with results of practical work and the conclusion of the paper.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blackhole Attack effect on MANETs' Performance","authors":"Mai Mostafa Gaber, Marianne A. Azer","doi":"10.1109/MIUCC55081.2022.9781680","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781680","url":null,"abstract":"Mobile Ad hoc networks (MANETs) facilitate the communication of devices with a limited communication range. A MANET can be described as a decentralized network with a constantly changing topology. This makes it vulnerable to different attacks. The black hole is one of the most dangerous attacks in MANETs. This paper discusses the Blackhole attack in a random mobility environment and analyses its impact on MANETs using several parameters for single and multiple connections.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127520424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}