G. Maher, Osama Abd-El-Roaf, N. El-Hefnawy, Ahmed Kfafy
{"title":"A Novel Approach for Multi-Resource Planning in Construction Engineering","authors":"G. Maher, Osama Abd-El-Roaf, N. El-Hefnawy, Ahmed Kfafy","doi":"10.1109/ICICIS46948.2019.9014772","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014772","url":null,"abstract":"Resource planning is considered as an important factor for the success of construction projects. The main challenge in multi-project scheduling environment is represented by the limitation of resources. The optimum scheduling means the right time to allocate the available resources to activities of construction projects. This paper presents a new approach for solving multi-resource multiproject scheduling (MRMPS) problem in order to minimize total make-span of concurrently implemented projects. The developed approach generates the best scheduling based on a new combination of two priority rule, Maximum successors and minimum negative impact (MSMNI). The first priority rule allocates resources to activities based on maximum successors (MS) for candidate activities for increase the candidate activities in the next iteration of scheduling. This means, achieving maximum utilization of resources in each time period before departure to another time period. In second priority rule, we choose activity implementation according to the minimum negative impact (MNI) of implemented activity. A numerical example and experimental results show that the proposed approach is more efficient than previous approaches in the same field.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key distribution protocol for Identity Hiding in MANETs","authors":"Yomna Mohsen, M. Hamdy, E. Shaaban","doi":"10.1109/ICICIS46948.2019.9014807","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014807","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are formed when a group of mobile nodes, communicate through wireless links in the absence of central administration. These features make them more vulnerable to several attacks like identity spoofing which leads to identity disclosure. Providing anonymity and privacy for identity are critical issues, especially when the size of such networks scales up. to avoid the centralization problem for key distribution in MANETs. This paper proposes a key distribution scheme for clustered ad-hoc networks. The network is divided into groups of clusters, and each cluster head is responsible for distributing periodically updated security keys among cluster members, for protecting privacy through encryption. Also, an authentication scheme is proposed to ensure the confidentiality of new members to the cluster. The simulation study proves the effectiveness of the proposed scheme in terms of availability and overhead. It scales well for high dense networks and gives less packet drop rate compared to its centralized counterpart in the presence of malicious nodes.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Hybrid (MD5 and RC4) Cryptography Algorithm Using Multi-Logic States","authors":"Suhad Muhaier Kareem, A. M. Rahma","doi":"10.1109/ICICIS46948.2019.9014819","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014819","url":null,"abstract":"In cryptography, the MD5 and RC4 algorithms are used in many applications to provide security. Both depend on two-state operations, such as XOR, for manipulating bits, and these operations are considered a weakness that can be vulnerable to attack. This paper presents a new hybrid of MD5 and RC4 based on a multi-logic states operation, called (E#), instead of XOR to increase the security level. This new (E#) uses three keys instead of one for controlling the variable block bits sizes of (1, 2, 4, and 8) bits and for determining the table numbers, which are formed from the addition in the Galois Field GF (2n) based on the block bit size for increasing the complexity of the proposed algorithm. This new hybrid algorithm leverages (E#) in both MD5 and RC4 and takes the output of the modified MD5 for use as the input key to RC4 increasing the security of RC4. The results are evaluated based on complexity, National Institute of Standards and Technology (NIST), histogram analysis, number of pixels of change rate (NPCR) and unified average changing intensity (UACI) and demonstrate that our modifications to both algorithms increase their complexity and security.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merrihan B. Monir, T. Abdelkader, El-Sayed M. Ei-Horbaty
{"title":"Trust Evaluation of Service level Agreement for Service Providers in Mobile Edge Computing","authors":"Merrihan B. Monir, T. Abdelkader, El-Sayed M. Ei-Horbaty","doi":"10.1109/ICICIS46948.2019.9014854","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014854","url":null,"abstract":"Mobile edge computing (MEC) is regarded as the extension of cloud computing services to the network edge. However, due to the lack of experience between service users and service providers, users always doubt about the fulfilment and satisfaction of their needs. This paper proposes a trust evaluation scheme that evaluates the service provider compliance to the service level agreement, thus, indicating its trust status. On the other hand, dissatisfaction rates are being computed, to show the drawback aspect of each service provider. This helps future users to get acknowledged of service providers' past interactions prior dealing with them. Therefore, eliminating the probability of existing compromised service providers and raising the security of future interactions between service providers and users in the MEC environment. Simulation results show that the higher SLA compliance, the lower the value of the service dissatisfaction rate given.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123631358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Management of Smart Homes Considering Appliance Scheduling Flexibility","authors":"S. M. Azzam, T. Elshabrawy, M. Ashour","doi":"10.1109/ICICIS46948.2019.9014687","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014687","url":null,"abstract":"Home Energy Management (HEM) is considered a great potential for energy efficiency in smart grids. With the advent of advanced metering infrastructure (AMI), demand side management (DSM) become possible where households (HHs) change their consumption behavior in response to electricity time varying prices provided by the utility. An optimization algorithm for HEM considering appliance scheduling flexibility is proposed with the aim of electricity bill cost minimization. The appliance scheduling is done on weekly basis to be able to model a more realistic scenario which is able to shift the operation of some appliances that aren't required to operate daily throughout the week. The problem is formulated as a binary integer programming (BIP) problem. Single home scenario is considered in this work. Real time pricing (RTP) is considered to be the electricity pricing tariff that incentivize the users to adjust their energy consumption. The performance of the proposed algorithm is tested under different simulation scenarios. Results show the effectiveness of the algorithm in minimizing the electricity bill cost.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of Moments Shape Descriptors and propose a new hybrid Descriptor technique","authors":"S. Hamandi, A. M. Rahma, R. Hassan","doi":"10.1109/ICICIS46948.2019.9014844","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014844","url":null,"abstract":"The shape is a significant visible feature of an object in images. Finding images by using shape features has gained much consideration. For precise computerized classification of the type of object in the image, different features extraction approaches may be used. To identify and determine the preferences among them, three different techniques are studied extensively and determined how it affected by the change which may happen to the different shapes with the proposal of a hybrid method that contains the robust descriptors of each technique which improves the results and provide strong features for shape description that achieves high accuracy reaching more than 90%.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine-learning discrimination: Bias in, bias out","authors":"T. Calders","doi":"10.1109/icicis46948.2019.9014827","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014827","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115517348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The cross-roads of algorithmic fairness, accountability and transparency in predictive analytics","authors":"","doi":"10.1109/icicis46948.2019.9014754","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014754","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Symmetric and Asymmetric Single Circular Split Ring Microwave Sensor Using COMSOL Multiphysics","authors":"Sameh Sherif, M. Eldosoky, A. Soliman","doi":"10.1109/ICICIS46948.2019.9014746","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014746","url":null,"abstract":"Microwave sensors are very promising for sensing the biological medium with different advantages such as non-invasive and miniaturized dimensions. In this paper, the analysis of the change in the geometry parameters of a planar circular split microwave sensors for detecting and characterizing the dielectric properties of different materials is presented. The study is applied on two main types of sensors, a planar symmetrical split ring resonator (SSRR) and a planar Asymmetrical split ring resonator (ASRR). These sensors are used to investigate the difference in dielectric properties of the medium which affected the resonance frequency based on the perturbation theory. The results show a comprehensive study for the microwave sensor. It can be used in different application as a high sensitivity sensor to extract the difference among more matched materials in S-parameters. The mathematical model is developed for the accurate calculation of shifts in the resonant frequencies, transmission, and reflection coefficients S21 and S11 under loaded materials vs the change of sensor geometric and the orientation of the gap. The analysis and simulation are investigated using COMSOL Multiphysics tool.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling One-way and Two-way quantum key distribution protocols","authors":"A. M. Sofy, M. Shalaby, H. Dahshan, A. Rohiem","doi":"10.1109/ICICIS46948.2019.9014729","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014729","url":null,"abstract":"The present cryptography systems security depends on the hardness of factorizing an integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor proposed a quantum procedure (Shor's algorithm) that easily factorizes large integer numbers to its prime factors compared with other algorithms. Consequently, present cryptography systems became endangered and once quantum computers exist, conventional cryptography systems could breakdown. On the other hand, quantum cryptography security is based on the well-known quantum mechanics uncertainty principle, and so the quantum cryptography enhances the cryptography field with a mechanism for eavesdropper detecting. Here, a hardware implementation was proposed for two types of key distribution protocols based on quantum computing, the one-way quantum key distribution protocol (BB84 protocol), and the two-way quantum key distribution protocol.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134121971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}