{"title":"Extracting knowledge from web server logs using web usage mining","authors":"Mirghani. A Eltahir, Anour F. A. Dafa-Alla","doi":"10.1109/ICCEEE.2013.6633973","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633973","url":null,"abstract":"The growth of the Internet is increasing rapidly and the use of websites and web-based systems has become very common. The main problem that faces any website admin or any web application system is data increase per-second, which is stored in different types and formats in server log files about users, their future needs and maintains the structure and content of website or web services according to their previous data. Web usage mining aims at discovering useful information or knowledge from usage data registered in log files, based on primary kinds of data used in the mining process. By using one of the web mining techniques, this paper uses a web usage mining technique to procure knowledge from web server log files where all user navigation history is registered.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123699704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-layer of multi factors authentication model for online banking services","authors":"M. Mohammed, Muna Elsadig","doi":"10.1109/ICCEEE.2013.6633936","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633936","url":null,"abstract":"The security risks of Internet banking have always been a concern to the service providers and users. In this work we analyze user authentication methods being used in various online environments, such as internet banking, electronic transactions and financial services, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. We integrated multi factor authentication with multi layer authentication techniques in order to produce a standard layered multi factor authentication model suitable for different internet banking services based on risk assessment criteria. The produced model consist of 5 level in which each level contain a one or combination of authentication factors such as knowledge based, possession-based or Biometric-based factors. The model then enhanced by adding control information factors, specifically for levels (4, 5), in order to support layering needs. Our paper suggests standard model compared to multi layering guidelines and it shows improvement and fulfillment of authentication needs.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple measurements vectors compressed sensing for Doppler ultrasound signal reconstruction","authors":"S. M. S. Zobly, Y. M. Kadah","doi":"10.1109/ICCEEE.2013.6633955","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633955","url":null,"abstract":"Compressed sensing (CS) is a novel framework for reconstruction images and signals. In this work we want to make use of the latest sampling theory multiple measurement vectors (MMV) compressed sensing model, to reconstruct the Doppler ultrasound signal. Compressed sensing theory states that it is possible to reconstruct images or signals from fewer numbers of measurements. In usual CS algorithms, the measurement matrix is vectors so the single measurement vectors (SMV) applied to generate a sparse solution. Instead of using the SMV model we want to make use of the MMV model to generate the sparse solution in this work. Doppler ultrasound is one of the most important imaging techniques. To acquire the images much data were needed, which cause increased in process time and other problems such as increasing heating per unit and increasing the amount of the data that needed for reconstruction. To overcome these problems we proposed data acquisition based on compressed sensing framework. The result shows that the Doppler signal can be reconstructed perfectly by using compressed sensing framework.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"44 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving problems of computer networks' planning using elastic networks method","authors":"S. M. Mahmoud, Saeed A. Al-Ghamdi","doi":"10.1109/ICCEEE.2013.6634008","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634008","url":null,"abstract":"This part of research focuses on analysis and evaluation for synthesis problem of a computer network heterogeneous structure. Where the core of the network has a ring topology, the network lower level-topology tree, and this paper composed of two interrelated parts. Firstly, this part of presented herein addresses one of problems concerned with planning of computer networks with heterogeneous structure associated with cost effectiveness. However, the second part presents other side of the computer networks' structure problem associated with optimality of network size. Specifically, at this first part focusing attention on the cost effectiveness problem of networks' structural features using modified elastic net method. It adopted modified method applied for reaching shortest path topology of computer network backbone structure via computing method of weight coefficient values. That solution characterized by introducing additional Synthesized weight coefficients' values taking into account the amount of internal network nodes' demands/ traffic. Interestingly, obtained solution results after simulated experiments proved to take the advantage of better cost effectiveness (lower cost) of designed network structure, rather than other well known applicable solutions to date.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable attributes selection technique for predicting the performance measures of a DSM multiprocessor architecture","authors":"E. I. M. Zayid, M. Akay","doi":"10.1109/ICCEEE.2013.6633934","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633934","url":null,"abstract":"In this study we develop a model for predicting the performance measures of a distributed shared memory (DSM) multiprocessor architecture by using a reliable attributes selection method. The structure of a DSM platform is interconnected by the Simultaneous Optical Multiprocessor Exchange Bus (SOME-Bus), which is a low latency high bandwidth fiber-optic interconnection network. OPNET Modeler is used to simulate the SOME-Bus multiprocessor architecture and to create the datasets. The input variables chosen for the prediction model include the ratio service time over packet transfer time (varies from 0.01 to 1), traffic patterns (uniform, hot region, bit reverse and perfect shuffle), DSM protocol type, node number (varies to 16, 32 and 64), thread number (varies from 1 to 6). The attributes selection method examined the models using different machine learning tools. These tools include: multilayer feed forward artificial neural network (MFANNs), support vector regression with radial basis function (SVR-RBF) and multiple linear regression (MLR). Cross validation (CV) technique is applied using 10 folds. The results show that MFANN-based model gives the best results (i.e. SEE=11.1 and R = 0.998587 for CWT; SEE=18.96 and R = 0.997 for NRT; SEE=60.46 and R=0.8638 for IWT; SEE=0.04795 and R = 0.9838 for PU; SEE=0.0348 and R=0.9990 for CU). Results of the constructed new selected subset are compared with the original feature space and the findings prove the accuracy and reliability of the model.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115437526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A parallel computer system for the detection and classification of breast masses","authors":"Soha Yousuf, S. Mohammed","doi":"10.1109/ICCEEE.2013.6633933","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633933","url":null,"abstract":"Breast masses are regarded of paramount importance attributed clear malignancy targets whose detection proves acute for breast cancer diagnosis. Despite the boost in technology that has enhanced diagnostic and clinical developments in the medical field; the accuracy in mammographic tumor evaluation still remains a comprising issue. This is with an even greater regard towards mass detection. This paper is aimed towards creating a dynamic mammographic image enhancement system in parallel to a tumor detection and classification system. A dynamic list of histogram based algorithms constitutes the enhancement system. The detection and classification system comprise of a Seed Region Growing (SRG) segmentation algorithm and a Multi Layer Perceptron (MLP) neural classifier using the Backpropagation algorithm. Results have rendered the proposed techniques promising with accurate levels of benign and malignant tumor discrimination and enhanced breast image quality. The latter system achieved 88% sensitivity, 72% specificity, an Az value of 0.84 and an overall classification accuracy of 80%.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of linear filter kernel developed from ultrasound phantom image","authors":"Alwaleed Abdelrahman, Omer Hamid","doi":"10.1109/ICCEEE.2013.6634011","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634011","url":null,"abstract":"The resolution reduction in ultrasound images is due to the nature of ultrasound propagation and interaction with tissues, in which speckle noise is the dominant noise source. A tissue equivalent phantom, with ultrasound properties similar to human tissues, was imaged and a background kernel was extracted from the image to function as a linear filter. The phantom image has been studied to evaluate the kernel size and location that could be selected. The objective of using the ultrasound phantom image is to simulate homogenous noise distribution related to scanning parameters of the ultrasound system. Implementations of the proposed method in pre-diagnosed images were presented. Standard filters were implemented to assess the performance of the proposed algorithm. The proposed method presents better results than a number of common linear filters.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131061719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review in interference analysis and management between hierarchical and flat architectures communications","authors":"A. Zakaria, R. Saeed","doi":"10.1109/ICCEEE.2013.6633924","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633924","url":null,"abstract":"Femtocells home base station, which are low power cellular base station that operate in licensed spectrum, installed on the subscriber's premises to provide cellular services within home, residences, apartment complexes, business offices and outdoor hotspot scenarios connected with the internet and cellular operator networks via digital subscriber line (DSL) router or cable modem, to improve coverage, provide, high data throughput, better voice services. This paper surveys femtocell technology, describes the key challenges facing femto network and it presents the future direction on applying planning and optimization to enhance femtocell performance, a detailed discussion about the interference management between the legacy hierarchical and flat architectures, where cell planning processes used in microcell networks which are not scaled to support millions of femtocells problem and its recent researches are discussed and reviewed.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the cybersecurity of cloud computing: A stakeholder centered economic approach","authors":"N. Ahmed","doi":"10.1109/ICCEEE.2013.6633950","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633950","url":null,"abstract":"After the era of mainframe computing (from the nineteen fifties to the nineteen seventies), and the era of personal computing (from the nineteen eighties to the first decade of this millennium), we are now witnessing the emergence of the era of cloud computing (starting from the second decade of this millennium). In the era of cloud computing, end users of computing resources subscribe to service providers, and pay for services on the basis of their level of use. This means that large numbers of users share computing and storage resources in a context where they have little control over access privileges. This raises massive security concerns, which must be addressed in order for the cloud computing paradigm to fulfill all its potential and deliver all its promise. This paper discusses the economic based measure of cyber security, and explores how it can be used to measure the security of the cloud, that affect of the various stakeholders.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tree-based conceptual matching for plagiarism detection","authors":"A. H. Osman, N. Salim, A. A. Elhadi","doi":"10.1109/ICCEEE.2013.6634003","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634003","url":null,"abstract":"This paper discusses a new plagiarism detection method for text documents called Tree-based Conceptual Matching. The proposed method not only represents the content of a text document as a tree, but it also captured the underlying semantic meaning in terms of the relationships among its concepts. The method was adopted to detect plagiarism in text documents. The tree-based played a very important role in this method. It looked at the amount of detecting plagiarized sentences from the original documents. Experiments have been carried out using the CS11 standard plagiarism detection corpus. The results were evaluated using information retrieval measurements, which are Recall, Precision and F-measure. The results were compared with other methods for plagiarism detection and we found our method outperforms the other methods for plagiarism detection.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}