Login New user?  
01-Applied Mathematics & Information Sciences
An International Journal



A real-time neural approach for malignant melanoma detection

Samy Bakheet, Mahmoud A.Mofaddel, Amal El-Nagar,
Abstract :
The American Cancer Society stated that malignant melanoma is the most serious type of skin cancer. Early and accurate diagnosis of melanoma significantly depends heavily on both the quality of extracted features and the precision of classification model in use. In this paper, we present a fully automated neural framework for real-time melanoma diagnosis in dermoscopy images. The input skin image is first pre-processed for enhancing image quality. Automatic thresholding proposed by Otsu method is used to segment the lesion area of the input image. Features are then extracted based on both color and typical geometric properties of skin lesions. Finally, the extracted features are fed into an Artificial Neural Network (ANN) classifier to classify each lesion in a given dermoscopic image as a benign or melanoma lesion. The proposed approach is successfully validated on the recent and public dermoscopy benchmark (PH2 dataset). The evaluation results obtained are promising and favorably compared with those of other related state-of-the-art methods in terms of both accuracy and computational cost.


An Efficient Snort NIDSaaS Based on Danger Theory and Machine Learning

Hussein M. Elshafie, Tarek M. Mahmoud, Abdelmgeid A. Ali,
Abstract :
Network Intrusion Detection System (NIDS) is a hardware or software application that allows computer networks to detect, recognize and avoid the harmful activities, which attempt to compromise the integrity, privacy or accessibility of computer network. Two detection techniques are used by the NIDSs, namely, the signature-based and anomaly-based. Signature-based intrusion detection depends on the detection of the signature of the known attacks. On the other hand, the anomaly-based intrusion detection depends on the detection of anomalous behaviours in the networks. Snort is an open source signature-based NIDS and can be used effectively to detect and prevent the known network attacks. It uses a set of predefined signatures (rules) to trigger an alert if any of the network packets matches one of its rules. However, snort fails to detect new attacks that do not have signatures in its predefined rules. So, Snort needs constant update of its rules to detect new attacks. To overcome this Snort’s deficiency, the presented paper suggests the use of Danger Theory concepts inspired from biological immune system with a machine learning algorithm to automatically create new Snort rules used to detect new attacks. Snort NIDS as a software as a Service (NIDSaaS) in the cloud computing has been suggested. Experimental results showed that the proposed modifications of the Snort improved its ability to detect the new attacks.


Further Study on Sg∗- Closed Sets and Nsg∗ Closed Sets in Nano Topological Spaces

R. Parimelazhagan, V. Jeyalakshmi,
Abstract :
:In this paper, we focused the set Strongly g∗d#, Strongly d􏰂0, Strongly d􏰂1, Strongly d􏰂2, Strongly g∗-kernel of A in topological spaces and studied some of their characters. We also introduce the Nano Sg∗ closed sets and studied few properties.


Bayesian Inference for the Randomly Censored Three-Parameter Burr XII Distribution

Rashad M. EL-Sagheer, Mohamed A. W. Mahmoud, Hasaballah M. Hasaballah,
Abstract :
In this paper, we obtain the point and interval estimations for a three-parameter Burr-XII distribution (TPBXIID) based on randomly censored data. The maximum likelihood (ML) and Bayes estimation method are used to estimate the unknown parameters of the TPBXIID. Furthermore, approximate confidence intervals (ACIs) for the unknown parameters are constructed. Markov chain Monte Carlo (MCMC) method applied to find the Bayes estimation. Also, highest posterior density (HPD) credible intervals (CRIs) are obtained for the parameters. Gibbs within Metropolis-Hasting samplers used to generate samples from the posterior density functions. A couple of real data sets are discussed to illustrate the proposed methods. Finally, to compare different estimates proposed in this paper, a Monte Carlo simulation study has been performed.


The entangling-probe attack on the Bennett-Brassard 1984 protocol

H. F. Abdel-Hameed,
Abstract :
In this paper, we introduce a generalization of the Fuchs-Peres-Brandt (FPB) attack which is the most powerful individual photon attack against Bennett-Brassard 1984 (BB84) quantum key distribution protocol. We suppose that Eve sets up here C-NOT gate with its control-qubit computational basis {|0iC, |1iC} given by an a rotation from the BB84 (H −V) basis.


Linear Instability of Inviscid Jets with Thermo-Capillarity

Abdullah M. Alsharif,
Abstract :
This study deals with the investigation of the temporal and spatial instability of inviscid jets with the effects of the thermal energy. The variation of surface tension causes Marangoni flow that affects drop formation and break-up of liquid jets. The governing equations are reduced into one-dimensional model by using an asymptotic analysis. The dispersion relation for thermo-capillary inviscid liquid jets is derived to examine the behavior of the dimensionless parameter of the linear instability. Moreover, the growth rate and the maximum wavenumber are displayed along the jet.


The Theory of the Edge Ideal of a Graph Together with Formal Local Cohomology Modules

Carlos Henrique Tognon, Radwan A. Kharabsheh,
Abstract :
There exists a systematic study of the formal local cohomology modules. In this paper, we discuted and studied about the formal local cohomology module. For the definition of this module is used the definition of the local cohomology module with respect to an ideal, where this module is mencioned in the text. Moreover, we involve the theory of graphs within of such module achieving an application for the edge ideal of a graph.


Image Pixel Permutation Operation Based on Elliptic Curve Cryptography

Omar Reyad, Hany S. Khalifa, Radwan Kharabsheh,
Abstract :
In this paper, elliptic curve (EC) based pseudo-random bit generator is used to control the group operation (GRP) method which has good inherent cryptographic properties. The new proposed method named EC-GRP operation combines the cryptographic properties of both elliptic curve cryptography (ECC) and the group bit permutation operation. When applied to image pixels, the proposed EC-GRP bit-level permutation method controlled by the EC pseudo-random bit generator, presented higher performance characteristics in terms of security analysis test benchmarking.


Some Types of Soft Ordered Maps via Soft Pre open Sets

T. M. Al-shami, M. E. El-Shafei,
Abstract :
In this study, we define the concepts of soft x-pre continuous, soft x-pre open, soft x-pre closed and soft x-pre homeomorphism maps, where x ∈ {I,D,B}. These concepts are formulated depending on the increasing, decreasing and balancing soft pre open sets. We characterize these concepts and illustrate the relationships among them with the help of examples. Among the interesting obtained results are those associate these concepts with their counterparts on topological ordered spaces.



Abstract :
This paper presents a different approach of turbo decoding by implementing sliding window algorithm in iterative decoding. In this method the entire trellis is divided into small length sequence of several windows and the turbo decoding algorithms are applied only on those windows instead of running over the entire trellis. The turbo decoding algorithms are applied only on windows. The BER performance of the turbo code is measured by implementing sliding window algorithm in iterative decoding methods. The performance degrade is improved by introducing overlapping in the sliding windows. By overlapping sliding window method in iterative decoding the BER performance of the turbo code is improved. All the simulation is done by using MATLAB and the BER is calculated for the communication model of AWGN channel with BPSK modulation, turbo encoding and decoding of Log Map, Max Log Map algorithm.


The Narrative of Renewable Sources of Energy in Science Fiction Films

Islam Abohela,
Abstract :
We identify how images of future cities in science fiction films make global change information more widely available to the public. However, it is noticed the persistence of presenting future cities as dystopias. This paper aims to identify how informed the images of future cities in science fiction films are by the current developments in renewable sources of energy and their integration within the city. It can be argued that science fiction films generally lack references to renewable sources of energy. The scarcity of these references to renewable sources of energy in science fiction films can be attributed to the perception of these images as a representation of a prosperous future society while, in many occasions, science fiction films depict future cities as a dystopia. This paper examines this assumption by comparing the dystopic visions of future cities to the utopic vision in science fiction films through the implementation of renewable sources of energy within the depicted future city and its buildings.



Salah A. Ali, Salah M. Omran,
Abstract :
This research was evolved to identify the role of managerial accounting information system (MAIS) in providing the necessary information needed for business process re-engineering (BPR), and suggestan integrated framework for such role. To achieve the study objective, an analytical field study was conducted. The analytical study comprises the BPR concepts, goals, motives and steps; the information needed for BPR; the extent to which the traditional, strategic and applied MAIS provide the information needed in conducting BPR; and the integrated framework for MAIS for the purpose of BPR. The field study was conducted through personal interview andquestionnaire to test the five hypotheses formulated from the theoretical study. The questionnaire was polled to managerial accountants, finance directors and production directors in a sample of companies engaged in the engineering industries and listed in the Egyptian stock market. The most important findings of this research are that; there are several factors that pushed the organizations to conduct the BPR, such as the accelerated developments in production and information technology, severe competition on both domestic and international levels andgrowth of the customer care concept. The BPR requires information in several areas which should be provided by the MAIS. The traditional managerial accounting information system (TMAIS) is not capable of fulfilling its role in the completion of BPR, and strategic managerial accounting information system (SMAIS) provides valued information about customers, competitors which help the organization to perform some of BPR. However, the BPR requires some more information which is not provided by SMAIS. The applied managerial accounting information systems (AMAIS) in the Egyptian companies do not provide the necessary information needed for BPR. There are a number of considerations that should be taken into account when the MAIS designed for the purposes of BPR. Furthermore, there is agreement between the finding of field study and the analytical study derived from the literature in this regard.


Computing the Median and Range for Power Function Distributions

Fahrettin Özbey,
Abstract :
Median and range of a random sample are measures based on order statistics which are descriptive of the central tendency and dispersion of the population, respectively. In this paper, I obtained the median and range for order statistics from non-identical standard power distributions functions. Then, the median and range for identical standard power functions distributions and uniform distributions functions are given. Finally numerical results of the median and range are presented.


The Solution of Quantum Kinetic Equation with Delta Potential and its Application for Information Technology

Mukhayo Rasulova,
Abstract :
The existence of the unique solution, in terms of initial data of the hierarchy of quantum kinetic equations with delta potential and application of kinetic equation for information technology, has been proven. The proof is based on the nonrelativistic quantum mechanics and application of semigroup theory methods.


New aspects and applications of entrepreneur’s critical success elements

Saad Darwish, Horiya AlDeeb, Atheela Al Azzawi, Atheer Al Rashid,
Abstract :
We investigate how critical success elements are perceived by the entrepreneurs. Determining unknown factors for small and medium businesses from an ensemble of identical systems is a fundamental, yet experimentally demanding, task in business. Here we study the critical success elements needed to fully characterize the success in business. We show this task can be achieved using new model, which yield a practical though non-universal set of projective measurements. An application has been given and it is shown that Bahrain is stepping up efforts to make small and medium businesses a major contributor to its growth.


The impact of Arab Impact Factor (AIF) on Human Knowledge

Abd Elrazek Abd Elrazek, Abduh Elbanna, Hossam El Masry,
Abstract :
Inspiration driven activities and services are used more nowadays to raise a communication capacity for meeting such society demands. Arab impact factor (AIF) originally inspired by Arab Impact Factor Project, is highly needed to increase the attention towards Arabic journals regularly published. Important knowledge published in Arabic language can experience new products and services that improve Arab quality of life. Inspiration and innovation mainly achieved by mother tongue. Publications in Arabic language will increase the impact of Arab activity in a way may impact the human inspiration and innovation in different behaviors. Using data mining analyses can predict those Journals will be repeatedly cited in the future, other journals might not be highly cited, accordingly give advice to predictable high- cited journals and predictably not cited Journals to promote activities or change strategy respectively. AIF using data mining machine learning may predict success of every organization.


Magnetohydrodynamic Peristaltic Flow of Jeffry Nanofluid with Heat Transfer Through a Porous Medium in a Vertical Tube

Nabil T. M. El-dabe, Mohamed Y. Abou-zeid, Yasmeen M. Younis,
Abstract :
The present paper deals with the peristaltic motion of a non-Newtonian nanofluid with heat transfer through a porous medium inside a vertical tube. The system is stressed by a uniform magnetic field. The viscous dissipation, internal heat generation with radiation effects are considered. A Rung-Kutta-Merson method and a Newton iteration in a shooting and matching technique are used to find the solutions of the momentum, temperature and nanoparticles equations. The numerical formula of the axial velocity, temperature and nanoparticles are obtained as functions of the physical parameters of the problem. Numerical calculations are carried out for these formula. The effects of physical parameters of the problem on this formula are discussed numerically and illustrated graphically througth a set of figures.


An Effective Approach for solving MHD Viscous Flow Due to A Shrinking Sheet

Mourad S. Semary, Hany N. Hassan,
Abstract :
In this paper, we present an effective technique combined between homotopy analysis method and traditional Pad´e approximation so-called (HAM Pad´e), the technique to obtain the analytic approximation solution of a certain type of nonlinear boundary value problem with one boundary condition at infinity. The analytic series solution obtained from the homotopy analysis method and the Pad´e diagonal approximation to handle the boundary condition at infinity. This technique apply to the boundary value problem resulting from the magnetohydrodynamic (MHD) viscous flow due to a shrinking sheet. The proposed technique success to obtain the two branches of solutions for important parameter. Comparison of the present solution is made with the existing solution and excellent agreement is noted.


Median and Extreme Ranked Set Sampling for penalized spline estimation

Ali Algarni,
Abstract :
This paper improves and demonstrates two approaches of Ranked Set Sampling (RSS) method for penalized spline models which are Median and Extreme RSS. These improved methods increase the efficiency of the estimated parameters in the targeted model with comparing to usual RSS and Simple Random Sampling (SRS). Moreover, in practical studies, our improved methods can reduce sampling expenses dramatically. The paper approaches are illustrated using a simulation study as well as a practical example.


Visualisation of a Three-Dimensional (3D) Object’s Optimal Reality in a 3D Map on a Mobile Device

Adamu Abubakar, Akram M. Zeki, Haruna Chiroma, Sanah Abdullahi Muaz, Mueen Uddin, Nadeem Mahmood, Tutut Herawan,
Abstract :
Prior research on the subject of visualisation of three-dimensional (3D) objects by coordinate systems has proved that all objects are translated so that the eye is at the origin (eye space). The multiplication of a point in eye space leads to perspective space, and dividing perspective space leads to screen space. This paper utilised these findings and investigated the key factor(s) in the visualisation of 3D objects within 3D maps on mobile devices. The motivation of the study comes from the fact that there is a disparity between 3D objects within a 3D map on a mobile device and those on other devices; this difference might undermine the capabilities of a 3D map view on a mobile device. This concern arises while interacting with a 3D map view on a mobile device. It is unclear whether an increasing number of users will be able to identify the real world as the 3D map view on a mobile device becomes more realistic. We used regression analysis intended to rigorously explain the participants’ responses and the Decision Making Trial and Evaluation Laboratory method (DEMATEL) to select the key factor(s) that caused or were affected by 3D object views. The results of regression analyses revealed that eye space, perspective space and screen space were associated with 3D viewing of 3D objects in 3D maps on mobile devices and that eye space had the strongest impact. The results of DEMATEL using its original and revised version steps showed that the prolonged viewing of 3D objects in a 3D map on mobile devices was the most important factor for eye space and a long viewing distance was the most significant factor for perspective space, while large screen size was the most important factor for screen space. In conclusion, a 3D map view on a mobile device allows for the visualisation of a more realistic environment.


The Development of a Prototype of the Campus Guide Mobile Application

Jaegeol Yim, Jaehun Joo, Gyeyoung Lee, Kyubark Shim,
Abstract :
We have developed a so-called campus guide mobile application running on Android smart phones. Nowadays, a smart phone is equipped with many sensors - some of them are pretty accurate, a powerful processor, and large capacity secondary memory devices. Making use of these features of smart phones, we have made the campus guide a location-based service in that it determines where the user is located, which building the user is interested in, and plays the video which is related to the building. Our implementation of the application is briefly described in this paper.


A new triangulation algorithm from 3D unorganized dense point cloud

xiaopeng wei,
Abstract :
This paper presents an algorithm for triangular mesh generation from unorganized points based on 3D Delaunay tetrahedralization and mesh-growing method. This algorithm requires the point density to meet the well-sampled condition in smooth regions and dense sampling in sections of a great curvature and two close opposite surfaces. The principle of the algorithm is as follows. It begins with 3D Delaunay tetrahedralization of all sampling points. Then extract part of triangles belonging to the surface as the seed facets according to the rough separation characteristics which based on the angle formed by the circumscribing balls of incident tetrahedrons. Finally, the algorithm grows the seed facets from front triangles to all triangles of the surface. This paper shows several experimental results which explain this approach is general and applicable to various object topologies.


The Evolution of Communication Network Architecture

Jinxin Zhang, Mangui Liang, Aqun Zhao,
Abstract :
Communication network architecture has experienced tremendous improvement from the ARPANET to IP with the number and traffic forms of users. Although IP is widely considered as the platform for future network, unfortunately, it is burdened by its her- itage of several decades. Nowadays, the bottleneck of bandwidth mainly lies in IP router not links. In this paper, we argue that one of the principal reasons for this is routing and forwarding planes are coupled together by analyzing the evolution of com- munication network architecture. Then we proposed a new network architecture to pro- vide faster forwarding speed. Simulation scenery shows this architecture is practical. Furthermore, we compared performance metrics (forwarding speed, length of address and total cost) with today’s IP network, our results indicate that forwarding speed is increased 72% of IP, the length of address is much less than IPv4 address and the total cost can be decreased 76% of the current network. Finally, we discuss several impor- tant issues of the new network architecture including address, network connection and end-to-end QoS as well as architecture extension.

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved