Nile Journal of Communication and Computer Science最新文献

筛选
英文 中文
Security Issues and Challenges for IoT-based Smart Multi Energy Carrier Systems 基于物联网的智能多能源载波系统的安全问题与挑战
Nile Journal of Communication and Computer Science Pub Date : 2023-12-20 DOI: 10.21608/njccs.2023.232944.1019
Magda El-afifi, Hesham Sakr
{"title":"Security Issues and Challenges for IoT-based Smart Multi Energy Carrier Systems","authors":"Magda El-afifi, Hesham Sakr","doi":"10.21608/njccs.2023.232944.1019","DOIUrl":"https://doi.org/10.21608/njccs.2023.232944.1019","url":null,"abstract":"The Internet of Things (IoT) is revolutionizing the energy sector by providing a platform for energy hubs to connect and manage energy resources. IoT-enabled energy hubs allow energy providers to monitor, analyse, and optimize energy use across their networks. Smart energy hubs can measure energy consumption in real time, giving energy providers insight into how much energy is being used and when. This data can be used to adjust pricing and energy supply in order to maximize efficiency and cost savings. Moreover, the integration of IoT technology in energy hubs facilitates the implementation of automated energy management systems. These systems may be programmed to effectively address fluctuations in energy demand and supply, thereby ensuring a consistent and dependable energy supply. Finally, IoT-enabled energy hubs can be used to integrate renewable energy sources such as wind and solar into the energy grid, allowing energy providers to reduce their carbon footprint and meet sustainability goals.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"211 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast Cancer Classification based on Artificial Intelligence: State of the Art 基于人工智能的乳腺癌分类:技术现状
Nile Journal of Communication and Computer Science Pub Date : 2023-12-20 DOI: 10.21608/njccs.2023.189145.1008
Warda Shaban
{"title":"Breast Cancer Classification based on Artificial Intelligence: State of the Art","authors":"Warda Shaban","doi":"10.21608/njccs.2023.189145.1008","DOIUrl":"https://doi.org/10.21608/njccs.2023.189145.1008","url":null,"abstract":"Breast cancer, a formidable ailment, stands as a prominent contributor to global female mortality rates. The timely detection of breast cancer is of utmost importance as it significantly enhances the probability of a favourable prognosis while concurrently reducing the likelihood of the disease advancing to an incurable state. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as prominent methodologies for the precise detection and classification of breast cancer within Computer-Aided Diagnosis (CAD) systems. This paper provides a comprehensive overview of the existing body of literature pertaining to the application AI in the realm of breast cancer detection. The primary objective of this study is to underscore the significance of employing AI in the timely identification of breast cancer, thereby enhancing the efficacy of subsequent treatment interventions. Furthermore, an examination of different screening methodologies for the detection of breast cancer is presented. Furthermore, we explore the fundamental components of CAD system, including preprocessing, segmentation, feature extraction, and feature selection. This paper will extensively examine the various classification strategies employed in the identification of breast cancer.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"9 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139168047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanisms of system penetration: Review 系统渗透机制:回顾
Nile Journal of Communication and Computer Science Pub Date : 2023-12-06 DOI: 10.21608/njccs.2023.248409.1024
Hesham Sakr, Magda I. El-Afifi
{"title":"Mechanisms of system penetration: Review","authors":"Hesham Sakr, Magda I. El-Afifi","doi":"10.21608/njccs.2023.248409.1024","DOIUrl":"https://doi.org/10.21608/njccs.2023.248409.1024","url":null,"abstract":"Given the escalating frequency of cyber-attacks worldwide, network security has become a pressing concern. Consequently, a substantial amount of \"ethical hackers\" have offered their services voluntarily to develop strategies and scripts to combat security problems. The necessity for more efficient management of security systems has led to the development of penetration testing, as it is time-consuming to maintain and monitor attacks on each hardware and software within an enterprise. Several research organisations have developed algorithms to protect networks based on their size, kind, and purpose. This study involves the construction of a simulated organisational framework to examine the practise of penetration testing within a live server-client environment. The Border Gateway Protocol (BGP) was selected as the routing protocol due to its extensive usage in contemporary networks. In addition, BGP exhibits low internal vulnerabilities, which enhances the overall security assessment. This research introduces computer-based attacks and actual network-based attacks, together with their corresponding defence methods. The article demonstrates the process of conducting penetration testing on a specific BGP network. Both internal and external network attacks are used to produce packets, exploits, and payloads. Firstly, we commence by delineating all the sub-fields within the penetration testing domain, together with its respective requirements and repercussions. This paper focuses on several techniques used to attack routers, switches, and physical client workstations in the context of educational and learning research.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"14 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138984286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Renewable Energy Sources Applications in Currently Occupied Structures 可再生能源在现有建筑中的应用
Nile Journal of Communication and Computer Science Pub Date : 2023-12-05 DOI: 10.21608/njccs.2023.232923.1018
Magda El-afifi, Walaa Abdelrazik
{"title":"Renewable Energy Sources Applications in Currently Occupied Structures","authors":"Magda El-afifi, Walaa Abdelrazik","doi":"10.21608/njccs.2023.232923.1018","DOIUrl":"https://doi.org/10.21608/njccs.2023.232923.1018","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"183 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138985247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment 在普遍环境中保护和识别黑客的蜂蜜算法
Nile Journal of Communication and Computer Science Pub Date : 2023-10-12 DOI: 10.21608/njccs.2023.195938.1010
Ageebee FAKI, Musa Yusuf, Ishaya Adelaiye
{"title":"Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment","authors":"Ageebee FAKI, Musa Yusuf, Ishaya Adelaiye","doi":"10.21608/njccs.2023.195938.1010","DOIUrl":"https://doi.org/10.21608/njccs.2023.195938.1010","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136014405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Project-based Iterative Teaching Model for Introductory Programming Course 基于项目的程序设计导论迭代教学模式
Nile Journal of Communication and Computer Science Pub Date : 2023-10-12 DOI: 10.21608/njccs.2023.154466.1006
Kashmala Pervaiz, Maida Shahid, Awais Hassan, Khaldoon Khurshid
{"title":"Project-based Iterative Teaching Model for Introductory Programming Course","authors":"Kashmala Pervaiz, Maida Shahid, Awais Hassan, Khaldoon Khurshid","doi":"10.21608/njccs.2023.154466.1006","DOIUrl":"https://doi.org/10.21608/njccs.2023.154466.1006","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trends in Biometric Authentication: A review 生物识别认证的发展趋势综述
Nile Journal of Communication and Computer Science Pub Date : 2023-10-11 DOI: 10.21608/njccs.2023.220975.1015
Magda El-afifi, Manar El kelany
{"title":"Trends in Biometric Authentication: A review","authors":"Magda El-afifi, Manar El kelany","doi":"10.21608/njccs.2023.220975.1015","DOIUrl":"https://doi.org/10.21608/njccs.2023.220975.1015","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Traffic Management Systems: A review 智能交通管理系统:综述
Nile Journal of Communication and Computer Science Pub Date : 2023-10-11 DOI: 10.21608/njccs.2023.211812.1012
Magda El-afifi, Hesham Sakr
{"title":"Intelligent Traffic Management Systems: A review","authors":"Magda El-afifi, Hesham Sakr","doi":"10.21608/njccs.2023.211812.1012","DOIUrl":"https://doi.org/10.21608/njccs.2023.211812.1012","url":null,"abstract":"Recent years have witnessed a colossal increase of vehicles on the roads; unfortunately, the infrastructure of roads and traffic systems has not kept pace with this growth, resulting in inefficient traffic management. Owing to this imbalance, traffic jams on roads, congestions, and pollution have shown a marked increase. The management of growing traffic is a major issue across the world. Traffic management is a key branch within logistics. It concerns the planning, control and purchasing of transport services needed to physically move vehicles (for example aircraft, road vehicles, rolling stock and watercraft) and freight. Intelligent Transportation Systems (ITS) have a great potential in offering solutions to such issues by using novel technologies. The ITS-based traffic management and control solutions in this evaluation have been divided into four categories: solutions for managing traffic, preventing congestion, and predicting trip times. The solutions, together with the underlying technology, benefits, and limitations, have been described.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Investigating the Role and Acceptability of Internet of Things in Energy Conservation in Nigeria 调查物联网在尼日利亚节能中的作用和可接受性
Nile Journal of Communication and Computer Science Pub Date : 2023-06-01 DOI: 10.21608/njccs.2023.321165
AdamuSulaiman Usman, Musa Yusuf, Ogwueleka Francisca Nonyelum
{"title":"Investigating the Role and Acceptability of Internet of Things in Energy Conservation in Nigeria","authors":"AdamuSulaiman Usman, Musa Yusuf, Ogwueleka Francisca Nonyelum","doi":"10.21608/njccs.2023.321165","DOIUrl":"https://doi.org/10.21608/njccs.2023.321165","url":null,"abstract":"","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135145881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Project-based Iterative Teaching Model for Introductory Programming Course 基于项目的程序设计导论迭代教学模式
Nile Journal of Communication and Computer Science Pub Date : 2023-06-01 DOI: 10.21608/njccs.2023.321167
Shahid, Maida, Pervaiz, Kashmala, Hassan, Awais, Khurshid, Khaldoon
{"title":"Project-based Iterative Teaching Model for Introductory Programming Course","authors":"Shahid, Maida, Pervaiz, Kashmala, Hassan, Awais, Khurshid, Khaldoon","doi":"10.21608/njccs.2023.321167","DOIUrl":"https://doi.org/10.21608/njccs.2023.321167","url":null,"abstract":"Introductory programming courses are considered to be the most important courses taught to undergraduate computer science students. However, teaching these courses in the best way possible has always been difficult. Mostly, students are unable to form the relation between the theory and the practical work. Thus, they find it difficult to put their skills to use, when they are required. This has been a centre of discussion among educational researchers for quite a long time. Many approaches have been brought forward and out of these; Project-based Learning is on top. PBL has been introduced in combination with various other frameworks to teach programming i.e., agile, scrum and task-driven teaching. Although, none of these approaches provides the teaching content for developing the project iteratively. In this research, we have merged Project-based Learning with an iterative approach to build-up a teaching model that will help students learn the skills and implement them accordingly with the help of a project. Students learn one skill at a time and implement that in the project. We also present our experience with the course taught according to this approach to undergraduate computer science students of session 2020 at the University of Engineering and Technology, Lahore, Pakistan. Results show that the iterative teaching model proposed in this paper addresses various shortfalls of the previously presented techniques and fulfils the requirements of an introductory programming course. Furthermore, the results also show an increase in the motivation of the students towards learning programming.","PeriodicalId":277392,"journal":{"name":"Nile Journal of Communication and Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135145862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信