{"title":"Towards an automated approach for health status evaluation of patients with Juvenile Idiopathic Arthritis","authors":"Amr M. T. Ali-Eldin, E. Hafez, R. Helal","doi":"10.1109/ICCES.2017.8275366","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275366","url":null,"abstract":"Juvenile Idiopathic Arthritis (JIA) is a chronic inflammatory rheumatic disease that leads to disabled children with deformed joints and chronic pains. Since, the use of the traditional scores that evaluate quality of life of JIA patients are time consuming and usually not either accurate nor easy to apply, there is a great need to generate a new, easy and effective way to evaluate the health status scores autonomously. In this study, an automated approach is proposed for modelling the relationship between health status of patients with JIA and a number of influencing factors using Neuro-fuzzy algorithms. The approach was applied on data collected from 128 patients with JIA. The proposed model was verified using statistical analysis. Further, results obtained from the Neuro-fuzzy system were found very promising.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Parallel Genetic Algorithm and Q-learning for QoS-aware Web Service Composition","authors":"D. Elsayed, M. Gheith, Eman S. Nasr, A. Ghazali","doi":"10.1109/ICCES.2017.8275307","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275307","url":null,"abstract":"Web Service Composition (WSC) is the process of reusing atomic Web services and combining them together to satisfy users' requirements. The main objective of WSC is to develop composite services to satisfy the Functional Requirements (FR), as well as optimizing the Quality of Services (QoS) requirements. This has led to the emergence of QoS-aware WSC. Due to the increase in number of Web services with the same functionality but various QoS, it became difficult to find the optimal solution in QoS-aware WSC in a given time frame. In this paper we propose a new approach that integrates the use of the Parallel Genetic Algorithm (PGA) and Q-learning to find the optimal WSC within reasonable time. Q-learning is used to generate the initial population to enhance the effectiveness of PGA. PGA is utilized to make the algorithm as time efficient as possible. We implemented our approach over .NET Framework platform 4.7 using C# programming language. The experiment results show the effectiveness of our proposed approach compared to PGA or GA only.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remotely configurable fault-tolerant FPGA-based pacemaker","authors":"G. Alkady, H. Amer, R. Daoud","doi":"10.1109/ICCES.2017.8275270","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275270","url":null,"abstract":"The Pacemaker is the most famous Implantable Medical Devices which is used in treating bradycardia and tachycardia. The pulse generator is the brain of the pacemaker; accordingly, it should be implemented using a powerful flexible platform. In this paper, an FPGA-based pulse generator is implemented. The Dynamic Partial Reconfiguration (DPR) property of FPGAs is used to allow the remote change of the operational mode of the pacemaker. A pacemaker is a real time critical system; therefore, it must be very reliable. Accordingly, Fault-Tolerant techniques should be applied to the FPGA-based pulse generator. Two Fault-Tolerant techniques are under investigation: two Duplication With comparison (DWC) circuits and Sift-out. The fault model used is Single Event Upsets (SEUs). Remote recovery takes place using DPR. Markov Models are used for reliability calculations. Results show that the Sift-Out technique is more reliable than the two DWC one.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122292064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature selection using dynamic binary particle swarm optimization for Arabian horse identification system","authors":"Samar I. Zekrallah, Mona M. Soliman, A. Hassanien","doi":"10.1109/ICCES.2017.8275389","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275389","url":null,"abstract":"Being able to formally identify horses is crucial for many reasons like biosecurity and regulatory risks, fairness in competition to ensure the proper horse and owner are competing in an event, retrieval after theft and medical record management. Among different horses types Arabian horse is one of the top ten popular horse breeds all over the world. It is the most expensive horse in the market. Such horse identification system can be based on biometric parameters. This work aims to introduce a novel method of periocular region segmentation using Otsu based method in combination with Improved Fruit Fly Optimization Algorithm (IFOA) followed by a feature extraction and selection phase for Arabian horse identification system. The segmented horse periocular region is subjected to texture analysis using Gabor filter and discrete cosine transform for proper feature extraction. A proper Feature Selection step is performed with the aim of selecting optimum features. Such optimal set of features will be used later in Arabian horse identification and recognition system. Such optimal feature selection is achieved using Dynamic Binary Particle Swarm Optimization.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT) security platforms","authors":"Ibrahim R. Waz, M. Sobh, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES.2017.8275359","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275359","url":null,"abstract":"This survey introduces IoT security items and how to achieve the requirements of these items in a constrained environment to guarantee security in every stage (Device, transmission of data, data on reset, service, and user). Also, it combines these items in one stack to deal with different IoT platforms, this made integration between items to assure the continuity of security from one stage to another stage and helps to have a full tracing of data from IoT device through the middleware to the user and vice versa. Also this paper presents different studies on available IoT platforms.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121198622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayman M. Bahaa-Eldin, Ebada Essam-Eldin ElDessouky, H. Dağ
{"title":"Protecting openflow switches against denial of service attacks","authors":"Ayman M. Bahaa-Eldin, Ebada Essam-Eldin ElDessouky, H. Dağ","doi":"10.1109/ICCES.2017.8275355","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275355","url":null,"abstract":"This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible, programmable, and can be used for several functionalities within a network. As the control algorithm of the switch is implemented on a separate computer (Controller), this software can be implemented on any part of the network packet including Layers 2, 3, and 4 headers. Therefore, an Openflow switch can work as a conventional switch, a router or a firewall. The open design of Openflow makes it vulnerable to several types of DoS attacks. One of those attacks is to overwhelm the switch flow table with entities larger than its buffer making legitimate packets unable to traverse the switch. The proposed approach depends on a Sandbox like model, where a second switch and controller is implemented and all new packets with no matching rules are forwarded to the Sandbox. The Sandbox clone is monitored and controlled, so a forwarding rule is always created on the Sandbox switch and transferred only to the working switch when it is classified as a normal rule. Otherwise, a cleanup operation is executed periodically on the sandbox switch to remove malicious rules. Rules are classified based on the statistics entries already existing in Openflow switches flow table. The proposed approach is simple and does not need any extra memory or modifications in the switches. It is proven to mitigate this type of DoS attacks.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust distributed authorization scheme for availability enhancement in VANET","authors":"A. Ali, Fatty M. Salem","doi":"10.1109/ICCES.2017.8275375","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275375","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) have become one of the platforms for relaying information in the Internet of Things (IOT). Unfortunately, VANETs can be vulnerable to several forms of attacks and threats. To overcome such problems, security and availability enhancing mechanisms are essential for VANET deployment. Clustering is one of the key points in VANETs, where cluster structure can facilitate overcoming some of the challenging issues in VANETs specially the security requirements. Secured and stable clustering play a significant role in VANET credibility. In terms of security, we shouldn't rely on centralized Certificate Authority (CA) in each cluster as it could be vulnerable to potential attacks and hence participant nodes in this cluster might lose access to it. Therefore, deploying decentralized approach for distributing the authorization inside clusters will overcome the authorization problem if the CA disappears or went missing. In this paper, we propose a distributed authorization scheme in which the role of the CA is distributed among a number of trusted nodes forming Certification Authority Committee (CAC). Since the certification authority, nodes' information and network secrets will be distributed over the CAC members, the presented scheme effectively guarantees both cluster stability and availability of security services. We analyzed the proposed scheme in terms of computation and storage complexity, communications overhead as well as network service availability. The results show that the availability of network services is greatly enhanced in adverse network status. This enhancement will be at the cost of negligible increment in storage complexity and communications overhead whereas the computational complexity is relative to the other distributed schemes.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic management of MPLS backbone networks using SDNs","authors":"Mohammad Mousa, Ayman M. Bahaa-Eldin, M. Sobh","doi":"10.1109/ICCES.2017.8275298","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275298","url":null,"abstract":"In MPLS backbone networks, network management complexity is rapidly increasing with the massive increase in network traffic. In addition, fast service creation and seamless failure recovery are highly desired operational requirements for many of the future safety and medical IoT services. On the other hand, Autonomic Network Management tends to be a very promising solution for most of the current network management challenges. In this paper, we tackle the problem of building an autonomic MPLS backbone network using SDNs. We have implemented a framework “OpenSP” as a prototype of the idea. Network operators are supposed to enter the service requirements from the customer point of view and OpenSP will take care of different network management tasks like forwarding rules generation, traffic engineering and failure recovery. Simulation results show a great enhancement in terms of the reduction of the network management complexity and the increase of the network efficiency.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient system for Melanoma diagnosis in dermoscopic images","authors":"A. Afifi, K. M. Amin","doi":"10.1109/ICCES.2017.8275278","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275278","url":null,"abstract":"In this work, an automatic computer aided diagnosis system for Melanoma in dermoscopic images is proposed. In which, a large set of features is extracted from normalized tumor area to mimic the well-known ABCD clinical diagnosis rule. Consequently, to select the most prominent set of features, a recursive feature elimination algorithm based on random forests classifier is utilized. To alleviate classes imbalance problem which usually occurs in clinical situations, the neighborhood cleaning rule (NCL) and the borderline synthetic minority over-sampling (Borderline-SMOTE) algorithms are integrated to produce a better balanced dataset. The final diagnosis is then obtained by utilizing an extra tree classifier which builds an ensemble of classifiers using different sets of features and makes a late fusion. This proposed pipeline allows the diagnosis system to perform well in different challenging situations. Evaluation of the proposed system was performed using a recently released dataset which has a large classes imbalance. The experimental results indicate the efficiency of proposed system. It achieves the best average precision score among recent competitors who use the same dataset. Moreover, it makes a better balance between sensitivity and specificity scores.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced framework for miRNA target prediction","authors":"Emad E. Ahmed, Sherin Elgokhy, M. Saidahmed","doi":"10.1109/ICCES.2017.8275367","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275367","url":null,"abstract":"MicroRNAs are small non-coding RNA molecules that play an important role in post-transcriptional gene regulation. They bind with messenger RNAs, affecting the regulation of gene expression causing diseases such as heart diseases and cancer. The two pioneer strategies of miRNA target prediction are either experimentally or computationally. Since experimental techniques are very expensive and slow, several computational tools have been proposed to defeat some of the experimental technical difficulties. In this paper, we propose an enhanced computational framework that predicts miRNA targets depending on structural, positional, and thermodynamic features extracted from the alignment of miRNA and its targets. Then, we select the linearly separable features using the eigenvalue analysis of the covariance matrix of the features. Finally, the selected features are applied to random forest classifier. The obtained results prove that our framework significantly excels other existing tools.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123604545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}