{"title":"Security Issues and Challenges for IoT-based Smart Multi Energy Carrier Systems","authors":"Magda El-afifi, Hesham Sakr","doi":"10.21608/njccs.2023.232944.1019","DOIUrl":"https://doi.org/10.21608/njccs.2023.232944.1019","url":null,"abstract":"The Internet of Things (IoT) is revolutionizing the energy sector by providing a platform for energy hubs to connect and manage energy resources. IoT-enabled energy hubs allow energy providers to monitor, analyse, and optimize energy use across their networks. Smart energy hubs can measure energy consumption in real time, giving energy providers insight into how much energy is being used and when. This data can be used to adjust pricing and energy supply in order to maximize efficiency and cost savings. Moreover, the integration of IoT technology in energy hubs facilitates the implementation of automated energy management systems. These systems may be programmed to effectively address fluctuations in energy demand and supply, thereby ensuring a consistent and dependable energy supply. Finally, IoT-enabled energy hubs can be used to integrate renewable energy sources such as wind and solar into the energy grid, allowing energy providers to reduce their carbon footprint and meet sustainability goals.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"211 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast Cancer Classification based on Artificial Intelligence: State of the Art","authors":"Warda Shaban","doi":"10.21608/njccs.2023.189145.1008","DOIUrl":"https://doi.org/10.21608/njccs.2023.189145.1008","url":null,"abstract":"Breast cancer, a formidable ailment, stands as a prominent contributor to global female mortality rates. The timely detection of breast cancer is of utmost importance as it significantly enhances the probability of a favourable prognosis while concurrently reducing the likelihood of the disease advancing to an incurable state. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as prominent methodologies for the precise detection and classification of breast cancer within Computer-Aided Diagnosis (CAD) systems. This paper provides a comprehensive overview of the existing body of literature pertaining to the application AI in the realm of breast cancer detection. The primary objective of this study is to underscore the significance of employing AI in the timely identification of breast cancer, thereby enhancing the efficacy of subsequent treatment interventions. Furthermore, an examination of different screening methodologies for the detection of breast cancer is presented. Furthermore, we explore the fundamental components of CAD system, including preprocessing, segmentation, feature extraction, and feature selection. This paper will extensively examine the various classification strategies employed in the identification of breast cancer.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"9 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139168047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mechanisms of system penetration: Review","authors":"Hesham Sakr, Magda I. El-Afifi","doi":"10.21608/njccs.2023.248409.1024","DOIUrl":"https://doi.org/10.21608/njccs.2023.248409.1024","url":null,"abstract":"Given the escalating frequency of cyber-attacks worldwide, network security has become a pressing concern. Consequently, a substantial amount of \"ethical hackers\" have offered their services voluntarily to develop strategies and scripts to combat security problems. The necessity for more efficient management of security systems has led to the development of penetration testing, as it is time-consuming to maintain and monitor attacks on each hardware and software within an enterprise. Several research organisations have developed algorithms to protect networks based on their size, kind, and purpose. This study involves the construction of a simulated organisational framework to examine the practise of penetration testing within a live server-client environment. The Border Gateway Protocol (BGP) was selected as the routing protocol due to its extensive usage in contemporary networks. In addition, BGP exhibits low internal vulnerabilities, which enhances the overall security assessment. This research introduces computer-based attacks and actual network-based attacks, together with their corresponding defence methods. The article demonstrates the process of conducting penetration testing on a specific BGP network. Both internal and external network attacks are used to produce packets, exploits, and payloads. Firstly, we commence by delineating all the sub-fields within the penetration testing domain, together with its respective requirements and repercussions. This paper focuses on several techniques used to attack routers, switches, and physical client workstations in the context of educational and learning research.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"14 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138984286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Renewable Energy Sources Applications in Currently Occupied Structures","authors":"Magda El-afifi, Walaa Abdelrazik","doi":"10.21608/njccs.2023.232923.1018","DOIUrl":"https://doi.org/10.21608/njccs.2023.232923.1018","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"183 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138985247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment","authors":"Ageebee FAKI, Musa Yusuf, Ishaya Adelaiye","doi":"10.21608/njccs.2023.195938.1010","DOIUrl":"https://doi.org/10.21608/njccs.2023.195938.1010","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136014405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Project-based Iterative Teaching Model for Introductory Programming Course","authors":"Kashmala Pervaiz, Maida Shahid, Awais Hassan, Khaldoon Khurshid","doi":"10.21608/njccs.2023.154466.1006","DOIUrl":"https://doi.org/10.21608/njccs.2023.154466.1006","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trends in Biometric Authentication: A review","authors":"Magda El-afifi, Manar El kelany","doi":"10.21608/njccs.2023.220975.1015","DOIUrl":"https://doi.org/10.21608/njccs.2023.220975.1015","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Traffic Management Systems: A review","authors":"Magda El-afifi, Hesham Sakr","doi":"10.21608/njccs.2023.211812.1012","DOIUrl":"https://doi.org/10.21608/njccs.2023.211812.1012","url":null,"abstract":"Recent years have witnessed a colossal increase of vehicles on the roads; unfortunately, the infrastructure of roads and traffic systems has not kept pace with this growth, resulting in inefficient traffic management. Owing to this imbalance, traffic jams on roads, congestions, and pollution have shown a marked increase. The management of growing traffic is a major issue across the world. Traffic management is a key branch within logistics. It concerns the planning, control and purchasing of transport services needed to physically move vehicles (for example aircraft, road vehicles, rolling stock and watercraft) and freight. Intelligent Transportation Systems (ITS) have a great potential in offering solutions to such issues by using novel technologies. The ITS-based traffic management and control solutions in this evaluation have been divided into four categories: solutions for managing traffic, preventing congestion, and predicting trip times. The solutions, together with the underlying technology, benefits, and limitations, have been described.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AdamuSulaiman Usman, Musa Yusuf, Ogwueleka Francisca Nonyelum
{"title":"Investigating the Role and Acceptability of Internet of Things in Energy Conservation in Nigeria","authors":"AdamuSulaiman Usman, Musa Yusuf, Ogwueleka Francisca Nonyelum","doi":"10.21608/njccs.2023.321165","DOIUrl":"https://doi.org/10.21608/njccs.2023.321165","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135145881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Project-based Iterative Teaching Model for Introductory Programming Course","authors":"Shahid, Maida, Pervaiz, Kashmala, Hassan, Awais, Khurshid, Khaldoon","doi":"10.21608/njccs.2023.321167","DOIUrl":"https://doi.org/10.21608/njccs.2023.321167","url":null,"abstract":"Introductory programming courses are considered to be the most important courses taught to undergraduate computer science students. However, teaching these courses in the best way possible has always been difficult. Mostly, students are unable to form the relation between the theory and the practical work. Thus, they find it difficult to put their skills to use, when they are required. This has been a centre of discussion among educational researchers for quite a long time. Many approaches have been brought forward and out of these; Project-based Learning is on top. PBL has been introduced in combination with various other frameworks to teach programming i.e., agile, scrum and task-driven teaching. Although, none of these approaches provides the teaching content for developing the project iteratively. In this research, we have merged Project-based Learning with an iterative approach to build-up a teaching model that will help students learn the skills and implement them accordingly with the help of a project. Students learn one skill at a time and implement that in the project. We also present our experience with the course taught according to this approach to undergraduate computer science students of session 2020 at the University of Engineering and Technology, Lahore, Pakistan. Results show that the iterative teaching model proposed in this paper addresses various shortfalls of the previously presented techniques and fulfils the requirements of an introductory programming course. Furthermore, the results also show an increase in the motivation of the students towards learning programming.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135145862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}