{"title":"Multicasting Information for Internet of Things Wireless Networks","authors":"A. Abdel-Hadi","doi":"10.1145/3436829.3436836","DOIUrl":"https://doi.org/10.1145/3436829.3436836","url":null,"abstract":"In this paper, we consider an Internet of Things (IoT) wireless network sharing the common wireless medium. For this network, we investigate a two-hop transmission strategy utilizing some of the network nodes as relay nodes. We analyze a two-hop multicast traffic alignment scheme over a time-varying circularly symmetric equal path length fading channels. The channel model is a finite field channel model with inputs and channel gains belonging to the same field Fq. We derive the achievable rates for multicasting information over this network from a set of source nodes to an equal set of destination nodes.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based Distributed Authentication Mechanism for Internet-of-Things Devices","authors":"Ahmad Mostafa","doi":"10.1145/3436829.3436876","DOIUrl":"https://doi.org/10.1145/3436829.3436876","url":null,"abstract":"Internet of Things (IoT) is rapidly becoming a one of the dominant technologies in today's world. However, due to the decentralized nature of the network, many vulnerabilities are introduced. The risks associated with these vulnerabilities are becoming significant due to the increasing use of the IoT devices. One of the main vulnerabilities is the authentication of different nodes in IoT. The decentralized nature of the network impedes the ability to create a traditional authentication system. In this paper, we introduce a novel decentralized authentication mechanism for IoT devices. This system is based on the blockchain technology and utilizes the unique environmental features available in the environment of the IoT device. We explain the unique features of the IoT networks, the different threats, and we discuss the different aspects of our proposed mechanism. We provide a security analysis for this introduced mechanism, and how it addresses different security attacks.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tayyba Zahoor, F. Azam, Muhammad Waseem Anwar, A. Tariq, Haider Ali Javaid
{"title":"An Investigation of Smart Parking Tools, Technologies, & Challenges","authors":"Tayyba Zahoor, F. Azam, Muhammad Waseem Anwar, A. Tariq, Haider Ali Javaid","doi":"10.1145/3436829.3436851","DOIUrl":"https://doi.org/10.1145/3436829.3436851","url":null,"abstract":"Urbanization, exceptional increase in population and advancement in technology caused the automotive industry to grow rapidly & automobiles become essential part of daily life. Consequently, finding a parking space particularly in populous zones, is a challenging task. Researchers have proposed different solutions to assist the developments in smart parking systems. In this paper, we have investigated the key tools, techniques & challenges proposed in the recent research studies. Primarily, a Systematic Literature Review is carried out, total 35 studies are explored during time interval of (2015-2019). Subsequently, five major areas are recognized where smart parking is often functional i.e. Internet of Things (IoT) (13 studies), Cloud Computing (2 studies), Model-Driven Engineering (4 studies), Fog Computing (6 studies) and Artificial Intelligence (11 studies). Furthermore, (15) primary tools and (25) algorithms are presented. This article also portray the challenges cited by different studies. The findings of this study will definitely assist the practitioners while deciding the appropriate selections.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127258299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amira A. Alshazly, Mustafa ElNainay, A. El-Zoghabi, M. Abougabal
{"title":"A Conceptual View for an Enhanced Cloud Software Life-Cycle Process (CSLCP) Model","authors":"Amira A. Alshazly, Mustafa ElNainay, A. El-Zoghabi, M. Abougabal","doi":"10.1145/3436829.3436830","DOIUrl":"https://doi.org/10.1145/3436829.3436830","url":null,"abstract":"Small to Medium-sized Enterprises (SMEs) benefit from the advantages of the cloud computing environment. These enterprises have limited resources. Consequently, SMEs require a structured software process model to develop a reliable and good quality cloud software. Existing cloud software process (CSP) models focused only on the processes of software development and ignored the other aspects of software production. In this paper, a conceptual view for Cloud Software Life Cycle Process (CSLCP) model is proposed. This model overcomes the deficiencies of existing CSP models. Also, it satisfies the development of a reliable and high quality cloud software. The CSLCP model is compatible with level two and three of the capability maturity model integration (CMMI). It extends the software process improvement (SPI) model, developed in Egypt for SMEs, to suit the cloud environment. The application of the CSLCP model in SMEs would improve their level of maturity","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alley El-Dorry, M. Reda, Sherif Abd El Khalek, Shehab El-Din Mohamed, Radwa Mohamed, Ayman M. Nabil
{"title":"Egyptian Universities Digital Certificate Verification Model Using Blockchain","authors":"Alley El-Dorry, M. Reda, Sherif Abd El Khalek, Shehab El-Din Mohamed, Radwa Mohamed, Ayman M. Nabil","doi":"10.1145/3436829.3436864","DOIUrl":"https://doi.org/10.1145/3436829.3436864","url":null,"abstract":"The forgery of certificates is a long-term problem in the academic community of Egypt. It has become common to get a fake certificate, that claims an individual has graduated from a public/private university, and apply for jobs easily and be considered as qualified as someone who has a legit certificate. Blockchain, which is known for its reliability and trust, is used as a solution for that problem. The proposed system aims at creating digital certificates for Egyptian higher education as a solution for the forgery problem. This proposed system enables the tracking of a student's certificates; hence, the organizations and institutions can verify the obtained certificates. The proposed system is implemented using Linux Foundation's Hyperledger Fabric.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131446490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Software Static Analyzers","authors":"Lobna Khaled, Nashwa Abdelbaki","doi":"10.1145/3436829.3436835","DOIUrl":"https://doi.org/10.1145/3436829.3436835","url":null,"abstract":"With the massive increase of software applications and websites, testing has become a very important concern in the software development process. This is due to the spread of a large number of security flaws. Dynamic testing requires code execution to examine the functional and non-functional behavior of software systems. It requires more time and cost, and it finds fewer bugs. On the other hand, static testing is done before code deployment and without code execution. Additionally, it provides a comprehensive diagnostics of code and focuses more on defects prevention. This provides greater benefits and is more cost-effective. Several techniques exist to perform static testing. One of them is using static analyzers tools that locate vulnerabilities in code and identify potential security flaws. Furthermore, these tools offer solutions to avoid security breaches. This paper contributes to the field of software testing in many aspects, by introducing the recent research studies in static analyzers. We discuss the importance of static analyzers and their challenges. We provide useful guidelines for selecting test cases to evaluate different static analyzers tools. Additionally, we explain a list of software common weaknesses. Furthermore, we explore the current research trend in static analyzers tools and techniques. Finally, we perform a research study to examine the performance of five PHP static analyzers tools. We report their ability to detect five common vulnerabilities by using Software Assurance Reference Dataset (SARD) test suite.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the Efficiency of Building Energy Simulation Software on Architectural Design Process","authors":"R. R. Moussa, D. R. M. Moawad","doi":"10.1145/3436829.3436860","DOIUrl":"https://doi.org/10.1145/3436829.3436860","url":null,"abstract":"New designing techniques are used recently during the design phases of buildings to adapt the environment and achieve human thermal comfort, one of these designing techniques is using energy simulation software's. However, architects need to understand the capabilities of these software's and its operation systems, when it comes to designing and modelling passive buildings. Moreover the validity of the design outcomes which is the main concern of this research. These energy simulation software's helps architects to estimate the building's energy efficiency in order to achieve human thermal comfort. This study will focus on studding and analyzing one of the well-known simulation software's used for building's energy simulations which is called \"Design-Builder\". The presented research will measure the accuracy of Design-Builder outcomes by comparing the accuracy of the thermal simulation in Design-Builder software to the results obtained from the experimental data. A Bookstore kiosk located in El-Sherouk city, Cairo, Egypt was chosen to be the study area of this research. The research will compare the simulation results of this Kiosk to the field's experimental measurements obtained from site visit. The results reveled that there is differences between the field measurements and the simulation ranged between 1 to 5°C. The study analyzed the causes of these differences and provided some proposals to improve Design-Builder software in order to provide more accurate data in simulating hot arid climates.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient vCPU Utilization for Reducing Energy Consumption in Cloud Data Centers","authors":"Noora Nahidh Behiya, R. A. Ahmed","doi":"10.1145/3436829.3436867","DOIUrl":"https://doi.org/10.1145/3436829.3436867","url":null,"abstract":"As the demand for cloud computing services continues to grow, the requirement for expanding cloud data centers also increases. One main issue facing this growth is the huge amount of energy consumed by the cloud data centers. The massive energy consumption expenses considered the main problem for cloud service providers. Recent reports revealed that the electricity expenses of Information and communications technology or (ICT) devices occupy 42% per month of the total budgets. Nevertheless, the continuous increase in energy consumption has become the main challenging subject. Due to this reason, researches have proposed many techniques and approaches (such as virtual machine VM consolidation, Voltage and Frequency Scaling, VM migration policies, etc.) for addressing this issue. This paper presents a study to evaluate the influence of controlling virtual machine central process unit (vCPU) on energy consumption of Cloud data center. CloudSim simulator is used to apply the dynamic voltage and frequency scaling (DVFS) technique with the proposed approach while processing different types of general purpose cloud computing applications (video streaming, file compression process, and video games). Results indicate that about 13% of data center energy was saved compared with the base DVFS system. This saving percentage result was a better percentage comparing with other results obtained from previous work.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"429 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115846689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. M. A. Omar, M. Zaghloul, Moustafa Mohamed Algwelly
{"title":"A Novel Arduino-Based Safety Vehicle System","authors":"M. M. A. Omar, M. Zaghloul, Moustafa Mohamed Algwelly","doi":"10.1145/3436829.3436841","DOIUrl":"https://doi.org/10.1145/3436829.3436841","url":null,"abstract":"In this paper a proposed car safety system is introduced, which can be installed using sensors distributed among cars, So that car accidents, thefts, fires alongside with car locations are reported by messaging chosen numbers by the car owner describing the type of accident that happened and the exact location of the car. Road accidents have been and still are very common in the present world with the prime cause being the careless driving as Egypt recorded 12000 death cases due to road accidents in 2019, also car theft is a major problem as statistics shows that there are 5000 theft cases in Egypt last year. As time in accidents is a prime factor, So the purpose of the proposed safety system is to minimize the delay in reporting such cases. The report tells who is concerned about the case of the car whether it is a case of theft, accident or fire eruption. Hence, the number of death cases due to road accidents are decreased and the possibility of retrieving the stolen cars or controlling fire is increased.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Randa Osama, N. Ashraf, Amina Yasser, Salma AbdelFatah, Noha ElMasry, Ashraf AbdelRaouf
{"title":"Greenhouse Plant Growth Supervision with the LED Lights using Machine Learning","authors":"Randa Osama, N. Ashraf, Amina Yasser, Salma AbdelFatah, Noha ElMasry, Ashraf AbdelRaouf","doi":"10.1145/3436829.3436847","DOIUrl":"https://doi.org/10.1145/3436829.3436847","url":null,"abstract":"Agriculture is considered the main resource of global economic growth. Greenhouses are glass buildings used to provide plants with their special needs in climate and growth. Our proposed approach tends to establish an automated greenhouse control system for speeding up the plant growth and increasing their production. Controlling the greenhouse is established using Arduino, real-time cameras, LED lights and fans. Different types of sensors are used such as DHT11, soil moisture and LDR. A web application is developed to monitor and track the greenhouse's parameters and the plants' growth. Masking with Hue-Saturation-Value (HSV) is used to detect the desired green range of the plant and the desired color range of the fruit/vegetable. Features are extracted using Histogram of Oriented Gradients (HOG) algorithm and One-Class Support Vector Machine (OC-SVM) as a classifier to detect the fruit/vegetable in the image. The proposed approach achieved 81.8% accuracy in the tomato's classification.","PeriodicalId":162157,"journal":{"name":"Proceedings of the 9th International Conference on Software and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}