8 results on '"Marghny H. Mohamed"'
Search Results
2. A Hybrid System for Securing Data Communication
- Author
-
Marghny H. Mohamed, Reem M. Mostafa, and Adel A. Sewsey
- Subjects
Fitness function ,Steganography ,business.industry ,Computer science ,Encryption ,Signal-to-noise ratio ,Robustness (computer science) ,Computer Science::Multimedia ,Genetic algorithm ,Key (cryptography) ,Sound quality ,business ,Algorithm ,Computer Science::Cryptography and Security - Abstract
This paper presents a One-Time Pad (OTP) encryption and a genetic algorithm (GA) audio steganography, respectively. In the proposed scheme, genetic algorithm is used for both encryption and steganography. In the encryption process, the key is randomly generated using genetic algorithm. The generated key is used as a key for the One-Time Pad algorithm. Then, the encrypted message is embedded in audio in the best position for embedding using signal-to-noise ratio (SNR) in genetic algorithm fitness function. Results had been discussed for the proposed scheme. It dissolves the drawbacks of key generating and distribution for One-Time Pad by using genetic algorithm. The proposed method satisfies the main steganography requirements pointed in perceptual transparency, hidden data capacity and robustness. Experimental results had been made, namely text analysis, waveform analysis and signal-to-noise ratio. Besides, a comparison of SNR for the proposed method withsome known algorithm. All are to indicate that the proposed method can significantly outperform many steganography techniques in terms of security and audio quality.
- Published
- 2019
- Full Text
- View/download PDF
3. Multi-Service Data Security Algorithm Based on Substitution Ciphers and Hadamard Transform
- Author
-
Marghny H. Mohamed and T. A. Tammam
- Subjects
Service (business) ,S-box ,Theoretical computer science ,Fibonacci number ,Computer science ,business.industry ,Applied Mathematics ,Substitution cipher ,Data security ,Cryptography ,Library and Information Sciences ,Computer Science Applications ,Hadamard transform ,Hadamard product ,business ,Algorithm - Published
- 2016
- Full Text
- View/download PDF
4. Efficient mining frequent itemsets algorithms
- Author
-
Marghny H. Mohamed and Mohammed M. Darwieesh
- Subjects
Apriori algorithm ,Association rule learning ,Computer science ,InformationSystems_DATABASEMANAGEMENT ,computer.software_genre ,Decimal ,GSP Algorithm ,Set (abstract data type) ,Artificial Intelligence ,Scalability ,Computer Vision and Pattern Recognition ,Data mining ,Database transaction ,Algorithm ,computer ,Software ,FSA-Red Algorithm - Abstract
Efficient algorithms for mining frequent itemsets are crucial for mining association rules as well as for many other data mining tasks. It is well known that countTable is one of the most important facility to employ subsets property for compressing the transaction database to new lower representation of occurrences items. One of the biggest problem in this technique is the cost of candidate generation and test processing which are the two most important steps to find association rules. In this paper, we have developed this method to avoid the costly candidate-generation-and-test processing completely. Moreover, the proposed methods also compress crucial information about all itemsets, maximal length frequent itemsets, minimal length frequent itemsets, avoid expensive, and repeated database scans. The proposed named CountTableFI and BinaryCountTableF are presented, the algorithm has significant difference from the Apriori and all other algorithms extended from Apriori. The idea behind this algorithm is in the representation of the transactions, where, we represent all transactions in binary number and decimal number, so it is simple and fast to use subset and identical set properties. A comprehensive performance study shows that our techniques are efficient and scalable comparing with other methods.
- Published
- 2013
- Full Text
- View/download PDF
5. Improving genetic process mining using Honey Bee algorithm
- Author
-
Marghny H. Mohamed, Khaled F. Hussain, and Yahia Z. Seleem
- Subjects
Genetic Processes ,Process modeling ,Computer science ,business.industry ,Event (computing) ,Process mining ,Honey bee ,computer.software_genre ,Machine learning ,Global optimum ,Genetic algorithm ,Data mining ,Artificial intelligence ,business ,computer ,Algorithm ,FSA-Red Algorithm - Abstract
Process mining refers to the extraction of process models from event logs. This paper presents a new process mining approach based on the combination of Honey Bee algorithm and Genetic Algorithm in which the benefits of Honey Bee algorithm is used where the concept of neighborhood search for a solution emerges from intelligent behavior of honeybee and the diversity of Genetic algorithm to find the global optimum. The new process mining approach presented in this paper is implemented as a plug-in in the process mining framework http://www.processmining.org. Computational experiments show that the process mining approach present in this paper gives a significant improvement over the basic Genetic algorithm.
- Published
- 2013
- Full Text
- View/download PDF
6. SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
- Author
-
Marghny H. Mohamed
- Subjects
Self-organizing map ,Cipher ,Symmetric-key algorithm ,Computer science ,business.industry ,Key (cryptography) ,Data security ,Cryptography ,File format ,business ,Algorithm ,Computer Science::Cryptography and Security ,Block cipher - Abstract
Data security is one of major challenges in the recent literature. Cryptography is the most common phenomena used to secure data. One main aspect in cryptography is creating a hard to guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques widely employed in several fields based on its characters, depending on the application area. One of these fields is data security. The state of art in this paper is the use of self organizing map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the cipher at one end. At the other end of communication the same process is synchronized to generate the same pad as the deciphering key. The security of the proposed model depends on the complex nature of ANN's. The algorithm could be categorized under symmetric cryptography, merging both stream and block cipher. A modified version of the same algorithm also presented employs permutation and variable SOM neighborhoods. The proposal can be applied over several file formats like videos, images, text files, data benchmarks, etc as show in experimental results.
- Published
- 2012
- Full Text
- View/download PDF
7. An ant colony optimization algorithm for the mobile ad hoc network routing problem based on AODV protocol
- Author
-
Ahmed M. Abdelmoniem, Abdel-Rahman Hedar, and Marghny H. Mohamed
- Subjects
Dynamic Source Routing ,Zone Routing Protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Enhanced Interior Gateway Routing Protocol ,Path vector protocol ,Wireless Routing Protocol ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Destination-Sequenced Distance Vector routing ,business ,Algorithm ,Computer network - Abstract
In this paper, we present a modified on-demand routing algorithm for mobile ad-hoc networks (MANETs). The proposed algorithm is based on both the standard Ad-hoc On-demand Distance Vector (AODV) protocol and ant colony based optimization. The modified routing protocol is highly adaptive, efficient and scalable. The main goal in the design of the protocol was to reduce the routing overhead, response time, end-to-end delay and increase the performance. We refer to the new modified protocol as the Multi-Route AODV Ant routing algorithm (MRAA).
- Published
- 2010
- Full Text
- View/download PDF
8. Convergence rate of minimization learning for neural networks
- Author
-
Marghny H. Mohamed, Teruya Minamoto, and Koichi Niijima
- Subjects
Quantitative Biology::Neurons and Cognition ,Artificial neural network ,Computer science ,business.industry ,Time delay neural network ,Deep learning ,Computer Science::Neural and Evolutionary Computation ,Probabilistic neural network ,Recurrent neural network ,Feedforward neural network ,Artificial intelligence ,Types of artificial neural networks ,Stochastic neural network ,business ,Algorithm - Abstract
In this paper, we present the convergence rate of the error in a neural network which was learnt by a constructive method. The constructive mechanism is used to learn the neural network by adding hidden units to this neural network. The main idea of this work is to find the eigenvalues of the transformation matrix concerning the error before and after adding hidden units in the neural network. By using the eigenvalues, we show the relation between the convergence rate in neural networks without and with thresholds in the output layer.
- Published
- 1998
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.