{"title":"Aggregating Local Metrics for Global Trust Calculations in the TOR Network","authors":"Nada M. Abdel Aziem, S. Fahmy, Attallah I. Hashad","doi":"10.1109/ICCTA35431.2014.9521619","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521619","url":null,"abstract":"This paper discusses the design and implementation of a distributed trust calculation mechanism that allows users in the peer-to-peer TOR anonymity network to determine whether or not the nodes that comprise the TOR network are malicious. This is done through a cooperative algorithm that allows individual nodes to measure the trust of the TOR nodes they communicate with. The paper measures the performance of this algorithm and shows that the algorithm can accurately identify several kinds of malicious nodes in the TOR network. This paper will focus on the following security issues: the problem of self reported bandwidth and uptime that can lead to low resource attack, geographical location and Denial of service (DoS) attack and how to aggregate all these criteria in one value that indicate whether or not the onion router is malicious. The aggregation is performed using two different techniques, each of which uses the exact same aggregation methods except for geographical location. The first method, which excludes entire geographical locations, produced slightly worse results than the second method, which assigned a scale between 0 and 0.99 for each geographical location to signify its trust","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Trust Management Model for Cloud Computing","authors":"Aya Salama A. Saleh, E. Hamed, M. Hashem","doi":"10.1109/ICCTA35431.2014.9521622","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521622","url":null,"abstract":"Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques like sliding window technique to reach optimum processes for trust value delivery. Trust value is evaluated through integrated mechanisms from literature. Moreover, measuring trust included evaluating SLA violations side to side with consumer customized measures for validating trust. Caching module has been added to ensure optimization of querying trusted services. Moreover, service registry and novel personalized modules have been added for tracking both cloud providers and cloud consumers behaviors. Furthermore, a comparison between literature’s trust models and proposed model has been presented. It discusses criterion for building and evaluating trust. Finally, security analysis is presented to substitute different techniques against known security attacks.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131571263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study","authors":"Khaled Ahmed, N. Tazi, A. Hossny","doi":"10.1109/ICCTA35431.2014.9521646","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521646","url":null,"abstract":"Social media contains a lot of useful information that express different aspects of the society using unstructured and temporal data. The main challenge with social media is the huge amount of the data streams to be processed. Such huge data requires huge processing capabilities, including the power, time and cost.This research presents a framework to extract, analyze and visualize the demographics of any country using the micro blogger data streams such as twitter. This increases the ability to search for topics with hash tags per city for a specific country as well as applying data mining techniques. The proposed framework uses big data tools including Hadoop and Hive to analyze the huge amount of textual unstructured data that is extracted from twitter then visualize it as needed.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process Algebras, Reasoning, And Validation","authors":"N. Hassan","doi":"10.1109/ICCTA35431.2014.9521621","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521621","url":null,"abstract":"Process algebras model concurrent systems, and hence permit system reasoning or validation of concurrent programs. These are bottom up paradigms that start from representation of each element of the system followed by representation of their interactions, i.e., their parallel processing and communication. The representation of agents as terms in an algebra enables derivation either alone or combined with other paradigms such as random variables, and hence process algebra adds its reasoning power. This paper presents these feats and complements with two possible implementations namely: line search, ant colony activation.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention Of DOM Based XSS Attacks Using A White List Framework","authors":"Khaled Ali, Ayman A. Abdel-Hamid, M. Kholief","doi":"10.1109/ICCTA35431.2014.9521633","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521633","url":null,"abstract":"Web applications are not guaranteed to be safe for both clients and servers since many vulnerabilities can be exploited in a web application to reach a malicious goal. One such vulnerability is Cross Site Scripting or XSS that has many types but in general is aimed at executing malicious scripts at the client’s machine when exploiting vulnerabilities in the server side. Another type of client side XSS vulnerability is called DOM (Document Object Model) Based XSS which can be achieved at client side only without putting any script in the server side. In this paper, we propose a DOM XSS prevention technique that protects the clients from web pages that contain such scripts in the HTML DOM tree source. This is an anti-DOM XSS framework that stops DOM XSS scripts and prevents it at client side. In addition, a prototype tool was implemented which has demonstrated the validity and viability of the proposed framework","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Students’ Attitudes toward Mobile Learning Adoption in Private University in Egypt","authors":"Tamer F Abdelfattah, Ossama Esmail","doi":"10.1109/ICCTA35431.2014.9521603","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521603","url":null,"abstract":"To solve the problem of Education in Egypt keep in mind no. of mobiles (%70) [18]. Mobile Learning not only effective tool for distance learning but also helpful for traditional education, Add how keen student is to it? The research describes the effectiveness of Mobile Learning technologies on student learning, participation and engagement from the perspective of undergraduates in The Arab Academy for Science and Technology and Maritime Transport which specially selected as a case of university that facilitates mobile learning services to staff and students in Egypt. Results suggest that students are performing a wide variety of educational tasks showing more readiness to adopt the use of mobile devices for learning and focus on working for creating a consolidated education for both E. and traditional learning. Finally, the study discusses the prospective for implementation of mobile device use in learning. Despite the locality environment of the study as it focuses on regional private university in Alexandria – Egypt, the study results might also be vital for countries fronting similar difficulties.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biologically Inspired Hierarchical Model for Traffic Sign Recognition","authors":"Amr Abdel Aziz, I. Imam, A. Shoukry","doi":"10.1109/ICCTA35431.2014.9521641","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521641","url":null,"abstract":"In this research, a study of the Hierarchical Temporal Memory (HTM) model using the Numenta Implementation “Nupic v1.7” and an investigation of its performance in solving the German traffic sign recognition task using standard benchmark data is conducted. Its performance is compared to that of a state of the art Multi-Column Deep Neural Network (MCDNN) that has been proved to exceed the human recognition accuracy for the same task.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131455855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Heuristic Quality-based Nurse Scheduling Algorithm for Emergency Centers","authors":"Ramy Refat, Ayman E. Taha, S. Senbel","doi":"10.1109/ICCTA35431.2014.9521608","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521608","url":null,"abstract":"Nurse scheduling is a very complex task for the human resource director in the health organizations due to the numerous requirements, limitations and rules (often conflicting) that must be considered. Work hours, number of day and night shifts that should be worked by each nurse, the number of consecutive day and night shifts assigned, vacation periods and weekend off requests are important factor during building the scheduling. This paper proposes a Quality Based Nurse Scheduling model (QBNS). It’s a new perspective to solve the nurse scheduling problem for nurse’s duty roster which is one of the most important components in healthcare who provides services to the community round the clock. Nurse scheduling is an orchestrating dynamic process which needs coordination and interaction besides the scheduling shifting methodologies and algorithms. This scheduling has many features. It improves the quality of nurses output and working as teamwork. It also proposes scheduling based on the daily outcome for every nurse through a reliable evaluation technique which automatically distributed the nurses to the shifts in pairs. In addition to previous features it maximizes nurses preferences, minimizes unfairness assignments and finding a balanced/fair schedule.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent based University Advising System","authors":"Mohammed A. Attia, O. Badawy, E. Kosba","doi":"10.1109/ICCTA35431.2014.9521604","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521604","url":null,"abstract":"Providing accurate advice to undergraduate students during their undergraduate program and directing them towards proper course selection is the means by which their main interests can constitute the basis for their choices in the undergraduate stage. In this paper we propose and develop a multi- agent-based university advising system for advising undergraduate students instead of the traditional advising method through departments’ advisors. This system aims at assisting undergraduate students of the Information System (IS) major at the Arab Academy for Science, Technology and Maritime Transport (AAST) to select the suitable courses during their undergraduate program. The proposed system enables students to select suitable courses for each semester without the need to consult advisors. Moreover, it takes into account course prerequisites and priorities. Java language, JADE platform and oracle 11g database are used to implement the system. As anticipated, the findings revealed that most of the undergraduate students who tested the system were very satisfied, as the results issued by the proposed system were found to be compatible to a large extent with the views of academic advisors.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Model for Service Response Time in Distributed Systems","authors":"Abdulhalim Dandoush, M. Elgamel","doi":"10.1109/ICCTA35431.2014.9521610","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521610","url":null,"abstract":"Peer-to-peer (P2P) systems have emerged as a cheap, scalable and self-repairing file sharing, backup/storage and video on-demand (VoD) solutions. Such distributed systems rely on data fragmentation and distributed storage of data over multiple peers. Files are usually partitioned into fixed-size blocks that are themselves partitioned into fragments. In such systems, some peers (clients) exploit the power of parallelism to download blocks/fragments of data stored in a distributed way over some other peers (servers). This idea is deployed even over a network of servers (mirrors and cache) to reduce download time. Determining response times in parallel downloading with capacity constraints on both the client downloads and server uploads is then an important measure of the quality of the service given by these systems. This download time depends on the throughput of the different connections created to obtain the fragments of the given file. This paper enriches the literature with a simple stochastic model of the download process in such large and complex systems. In particular, it characterizes the response time performance metric and assesses its expectation through Markovian model and validates the study through the packet level Network Simulator NS-2. The relative error between the numerical results of the proposed model and the result of the simulation is reported. The comparison shows that the Model characterizes with high accuracy the response time under realistic assumptions.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}