{"title":"Arabic Language Sentiment Analysis using Bidirectional Long Short Term Memory","authors":"Osama Elsamadony, A. Keshk, Amira Abdelatey","doi":"10.21608/ijci.2022.157244.1084","DOIUrl":"https://doi.org/10.21608/ijci.2022.157244.1084","url":null,"abstract":"The amount of data generated in the digital era is huge since the super growth of social networks. Sentiment analysis (SA) seeks to extract opinions from a text and determine the polarity (positive, negative, or neutral). SA is widely used to refer to English. The topic of this study is SA in the Arabic language. There is an amalgamation between Word2Vec and Bidirectional Long-Short Time Memory (BLSTM) used in this paper. Firstly, words in reviews are transferred into their corresponding vectors with word representation models. Secondly, the sequence of words in the sentences passes as input to BLSTM. BLSTM not only captures long-range information and solves the gradient attenuation problem, but it also better represents the future semantics of the word sequence. The polarity was calculated using Word2Vec representation models, which rely on meaning and context. A BLSTM-based deep learning (DL) architecture is proposed. The result shows that the BLSTM Model Architecture surpasses ML, CNN, and LSTM Architectures with a maximum accuracy of 94.88 percent.","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Islam A Ramadan, Hany Harb, Hamdy M. Mousa, M. Malhat
{"title":"Assessment Reliability for Open-Source Software using Probabilistic Models and Marine Predators Algorithm","authors":"Islam A Ramadan, Hany Harb, Hamdy M. Mousa, M. Malhat","doi":"10.21608/ijci.2022.151916.1080","DOIUrl":"https://doi.org/10.21608/ijci.2022.151916.1080","url":null,"abstract":"","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116208246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mina I. S. Ibrahim, Hussien AbdelRaouf, Khalid Amin, N. Semary
{"title":"Keystroke dynamics based user authentication using Histogram Gradient Boosting","authors":"Mina I. S. Ibrahim, Hussien AbdelRaouf, Khalid Amin, N. Semary","doi":"10.21608/ijci.2022.155605.1081","DOIUrl":"https://doi.org/10.21608/ijci.2022.155605.1081","url":null,"abstract":"User authentication is a vital part of securing digital services and preventing unauthorized users from gaining access to the system. Nowadays, organizations use Multi-Factor Authentication (MFA) to provide robust protection by utilizing two or more identity procedures instead of using Single Factor Authentication (SFA) which became less secure. Keystroke dynamics is a behavioral biometric that examines a user’s typing rhythm to determine the subject’s legitimacy using the system. Keystroke dynamics have a minimal implementation cost and do not need special hardware in the authentication process since the gathering of typing data is reasonably straightforward and does not involve additional effort from the user. In this work, we present an efficient approach that uses the quantile transformation that transforms data distribution into uniform distribution which significantly reduces the impact of outlier and extreme values. Histogram Gradient Boosting is employed as the primary classifier for the training and testing phase. Our proposed approach is evaluated on Carnegie Mellon University (CMU) keystroke benchmark dataset which has achieved 97.96% of average accuracy and 0.014 of average equal error rate (EER) across all subjects which outperforms all the previous advances in both machine and deep learning approaches.","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of COVID-19 Diagnosis Using Lung Ultrasound Based on Convolutional Neural Networks","authors":"Ola Elkhuoly, M. Malhat, A. Keshk, M. Elsabaawy","doi":"10.21608/ijci.2022.151629.1079","DOIUrl":"https://doi.org/10.21608/ijci.2022.151629.1079","url":null,"abstract":"","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123990314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial: Introduction, IJCI Editorial Board, Sample paper and Table of contents","authors":"","doi":"10.21608/ijci.2022.259000","DOIUrl":"https://doi.org/10.21608/ijci.2022.259000","url":null,"abstract":"","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133541205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A blind fragile watermarking for 3D triangular model based on curvature features and chaos sequence","authors":"kariman mamdouh, N. Semary, Hatem Ahmed","doi":"10.21608/ijci.2022.120581.1068","DOIUrl":"https://doi.org/10.21608/ijci.2022.120581.1068","url":null,"abstract":"Noura A.Semarya,Kariman M.Mabrouka,, Hatem Abdul-Kaderb a Information Technology dept., Faculty of Computers and Information, Menoufia University, Menoufia 32511, Egypt b Information system dept., Faculty of Computers and Information, Menoufia University, Menoufia 32511, Egypt kariman.mamdouh@ci.menofia.edu.eg Abstract 3D models unauthorized modification is an attractive research problem nowadays due to the widespread availability of technologies and designs on the internet. In this paper, we propose a blind fragile watermarking scheme in the spatial domain for 3D model authentication based on the curvature features of the 3D model and chaos sequence. First, we compute the curvature feature for every vertex of the 3D model, after that, the vertices are classified into 3 classes: flat, peak, and In-between vertices using K-means clustering algorithm. We suggested two methods for embedding the watermark based on the least significant bit (LSB) substitution technique; Cluster Type-based Embedding (CTE) and Cluster Size-based Embedding (CSE). The proposed methods employ a Chaos sequence generator to generate a Chaos sequence that is used to generate the embedded watermark, where the tampering region can be verified and located by the Chaos sequence-based watermark check. Many assessment methods are employed to evaluate the proposed method with various unauthorized attacks like rotation, translation, scaling, cropping, and noise addition. The experiment results show an improvement of embedding imperceptibility as well as tempered regions detection compared to existing literature works.","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130533920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving COVID 19 Detection based on a hybrid data mining approach","authors":"Dina Goda, N. Mahmoud","doi":"10.21608/ijci.2022.145681.1078","DOIUrl":"https://doi.org/10.21608/ijci.2022.145681.1078","url":null,"abstract":"The worldwide spread of coronavirus disease (COVID-19) has become a threatening risk for global public health. Currently, doctors resort to PCR analysis, however, it suffers from low accuracy problems. On the other hand, Convolutional neural network (CNN) and despite its high accuracy incorrect classification, it takes a long time to train data, in addition it requires large training dataset. In this paper, we propose a hybrid approach for COVID-19 detection and diagnosis. Our contribution consists of two phases to provide high detection accuracy. In the first phase, we propose a hybrid features-fusion phase that works by fusing four common features extracted from medical image, Row pixel intensity, Colour histogram, Harlick texture and Threshold. Each single classifier is fed with these four features and yielded a 4 different predictions for each feature. A well-known voting technique is then applied to provide final predication result for each classifier. Secondly, the ensemble stacking technique is employed to fuse predication of each classifier, which significantly improves final detection accuracy. The proposed approach has been quantitatively evaluated on a public dataset of 5000 CT- images. The proposed approach yields accuracy of 99.3% and overcome traditional approaches such as KNN (K-nearest neighbours) that yields 92%, and SVM (Support vector machines) that yields 92% comparable computational time that is approximately 4.9 minutes.","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126198450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques for DDoS Attack in SDN: A Comparative Study","authors":"A. Yaser, Hamdy M. Mousa, M. Hussien","doi":"10.21608/ijci.2022.133407.1073","DOIUrl":"https://doi.org/10.21608/ijci.2022.133407.1073","url":null,"abstract":"","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Technique for Skin Lesion Diagnosis using Dermoscopic Images","authors":"Aya Mosa, A. Afifi, Khalid Amin","doi":"10.21608/ijci.2022.137601.1075","DOIUrl":"https://doi.org/10.21608/ijci.2022.137601.1075","url":null,"abstract":"","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ride-Sharing Services: From Centralization to Decentralization","authors":"Nesma Mahmoud, Asmaa Ali, Hatem Abdel-Kader","doi":"10.21608/ijci.2022.130527.1072","DOIUrl":"https://doi.org/10.21608/ijci.2022.130527.1072","url":null,"abstract":"","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"1127 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}