أبحاث أعضاء هيئة التدريس

أنت هنا

Associative Classification Based On Incremental Mining (ACIM) مصطفى احمد الفيومي

Associative classification (AC) is an approach in data mining that uses association rule to build classification systems that are easy to interpret by end-user. When different data operations (adding, deleting, updating) are applied against certain training data set, the majority of current AC algorithms must scan the complete training dataset again to update the results (classifier) in order to reflect change caused by such operations. This paper deals with data insertion issue within the incremental learning in AC mining. Particularly, we modified a known AC algorithm called CBA to treat one aspect of the incremental data problem which is data insertion. The new algorithm called Associative Classification based on Incremental Mining (ACIM). Experimental results against six data sets from UCI data repository showed that the proposed incremental algorithm reduces the computational time if compared to CBA, and almost derives the same accuracy of it.

...
Comments on the Secure Identity-Typed Bilinear Pairing Scheme مصطفى احمد الفيومي

The digital signature is the main issue in construction the secure authentication protocol. For example, He et al. introduced two authentication protocols in 2012. Both protocols rely on the identity-typed signature scheme and they claimed that their protocols are secure and efficient. But, at the same year, He et al. indicated that both schemes are weak against the key compromised problem. Therefore, they presented a new revision in order to solve this difficulty without losing a security and efficiency of the protocols. In this paper we demonstrate that the suggested new revision still weak against the key compromised problem.

...
Enhanced Associative classification based on incremental mining Algorithm (E-ACIM) مصطفى احمد الفيومي

Several association classification algorithms have been designed to build efficient and accurate associative classifiers for large data set .  Most of  classification algorithms are still suffer from the huge number of the generated classification rules which takes efforts to select the best ones in order to construct the classifier. Moreover, When different data operations (adding, deleting, updating) are applied against certain training data set, the majority of current AC algorithms must scan the complete training dataset again to update the results (classifier) in order to reflect changes caused by such operations. To overcome such drawbacks, the Associative Classification based on Incremental Mining (ACIM) algorithm has been proposed to handle with incremental data without jeopardizing the classification accuracy. The main assumption of ACIM algorithm is to build a classifier when new data arrive by utilizing the old classifier without rescanning to the entire dataset. This paper introduced a modified ACIM algorithm called Enhanced ACIM (E-ACIM). This algorithm deals with the data insertion problem in associative classification context. The E-ACIM is competitive and more efficient in computational time compared with ACIM and CBA algorithms and almost provides  the same accuracy  for both algorithms.

...
Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography مصطفى احمد الفيومي

The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to redirection attack which allows an adversary to redirect user traffic form a network to another and eavesdrop or mischarge the subscribers in the system.  Moreover, the International Mobile Subscriber Identity (IMSI) which uniquely identifies a user, is still reveal to the visited network and can still be demanded by an attacker who impersonates a base station, as there is no network authentication in this case, and the non-repudiation services requirement which provide the protection for the subscribers from incorrect bill charging, and the service providers with legal evidence when collecting the bills, are two important points in the non-repudiation requirement. In this paper, a dynamic authentication protocol by integrating the public-key cryptography with the hash-chaining technique is presented to significantly improve the security level as well as to improve the performance.

...
End-to-End Route Reliability in Pervasive Multi-Channel Multi-Radio (PMCMR) Scheme for MANETS مصطفى احمد الفيومي

Multi-channel multi radio Wireless communications technologies have changed the trend of traditional routing based QoS (quality of service) in wireless-mesh networks. This avalanche of growth in multimedia communication is trigged by multi-channel multi-radio wireless mesh networks (MCMR-WMNs). It is forecasted that in the near future, societal networks will have latest state of the art radio devices with multichannel and multi radio (MCMR) communication power with enhanced reliability, throughput and self-healing features. Despite of marked improvements in data link layer and physical layer in the IEEE 802.11 standards, optimized throughput, performance, and network availability of MCMR wireless mesh networks still depend upon the efficient routing metric or protocol. We carried out a set of experiment and observed that cross layer routing in mesh networks is highly influenced by traffic load, interference between channel and interference between nodes. Proposed scheme used ‘conjugate distribution method’ which was designed to evaluate end-to-end route and communication reliability using posterior distribution function.  Routing metric is evaluated based on load aware, intra & inter-interface aware, packet average delivery ration, latency and overhead with considered criteria of average path length. Competitive study revealed that proposed technique is efficient and applicable especial in environment where end-to-end reliability is required.

...
DS-AKA: Dynamic and Secure Authentication and Key Agreement Protocol for UMTS Networks مصطفى احمد الفيومي

The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) adopts the security features of Global System for Mobile (GSM) in order to interwork with GSM compatibility. Furthermore, the UMTS increases more security features than GSM to design an authentication and key agreement protocol, which is called UMTS AKA protocol. The UMTS AKA is still vulnerable to redirection and man-in-the-middle attacks, which allow an adversary to redirect user traffic form a network to another and eavesdrop or mischarge the subscribers in the system.  Moreover, UMTS AKA protocol has performance problems, including bandwidth consumption between a serving network and user’s home network and space overhead of the serving network. In this paper, by using a key hash chaining authentication technique an innovative contribution introduces a dynamic and secure AKA protocol, called DS-AKA to resolve the security issue and cope with performance problems. A security analysis and comparison with related work shows that DS-AKA protocol is more secure and the network can be operated in a more efficient way.

...
Processing the Text of the Holy Quran: a Text Mining Study محمد عمر الحوارات

 The Holy Quran is the reference book for more than 1.6 billion of Muslims all around the world Extracting information and knowledge from the Holy Quran is of high benefit for both specialized people in Islamic studies as well as non-specialized people. This paper initiates a series of research studies that aim to serve the Holy Quran and provide helpful and accurate information and knowledge to the all human beings. Also, the planned research studies aim to lay out a framework that will be used by researchers in the field of Arabic natural language processing by providing a ”Golden Dataset” along with useful techniques and information that will advance this field further. The aim of this paper is to find an approach for analyzing Arabic text and then providing statistical information which might be helpful for the people in this research area. In this paper the holly Quran text is preprocessed and then different text mining operations are applied to it to reveal simple facts about the terms of the holy Quran. The results show a variety of characteristics of the Holy Quran such as its most important words, its wordcloud and chapters with high term frequencies. All these results are based on term frequencies that are calculated using both Term Frequency (TF) and Term Frequency-Inverse Document Frequency (TF-IDF) methods.

...
Aldaej, A., Krause, P. (2014). An Enhanced Approach to Semantic Markup of VLEs Content Based on Schema.org. In 4th Int. Workshop on Learning and Education with the Web of Data–13th Int. Semantic Web Conference. Riva del Garda, Italy. عبدالعزيز عبدالله الداعج

Coming soon..

...
Aldaej, A., Krause, P. (2014). SocialLearn Demo. Making it Matter: Supporting education in the developing world through open and linked data, LINKEDUP Project, London, UK, 16th May, 2014. عبدالعزيز عبدالله الداعج

Coming soon..

...
Aldaej, A., Krause, P. (2013). E-Learning evolution: Semantic Web and social networking. 3rd Postgraduate Research Conference, University of Surrey, Guildford, UK, 29th-30th January 2013. عبدالعزيز عبدالله الداعج

Coming soon..

...
QR Code for https://cces.psau.edu.sa/ar/sources/research/5