By Topic

2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT)

8-10 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 60
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1803 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (251 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2015, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (130 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xv - xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Surface Quality of Mild Steel Machined by Wire EDM Using Simulated Annealing Algorithm

    Publication Year: 2015, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1131 KB) | HTML iconHTML

    One of the main machining characteristics that play vital role in determining the quality of engineering components is surface integrity. The fatigue strength, corrosion and wear resistance is enhanced by good quality surfaces of the work piece. The purpose of this research is investigating and optimizing the effects of three parameters: peak current (IP), wire speed (WS), and wire diameter (D) on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Soft Computing Methods as an Effective Tool in Predicting Surface Roughness

    Publication Year: 2015, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    The aim of this research is to compare between two different approaches in predicting and modeling the surface roughness in high speed hard turning: regression analysis approach and soft computing approach. Three different soft computing techniques have been applied: Support vector machine (SVM,) Extreme learning machine (ELM) and Artificial neural network (ANN). A set of sparse experimental have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Virtualization Solutions for Real-Time Applications

    Publication Year: 2015, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Currently many interactive applications are running remotely by many users. The success of these applications much depends on performance which accepts data or commands from users. The virtualization solutions provided a suitable environment to increase flexibility, easy to apply redundancy concepts to achieve consolidation of computing resources. The main requirement for successful virtualization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Double-A -- A Salsa20 Like: The Design

    Publication Year: 2015, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    This paper discusses the design choices of the sponge constructed cryptographic hash function Double-A. Firstly, the relative advantages of why a stream mode cipher is used rather than a block mode cipher are given. Secondly, a description of what a sponge function is, how it is designed and what are its main components. Finally, after a brief recall of the Salsa20 stream cipher and its structure,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Double-A -- A Salsa20 Like: The Security

    Publication Year: 2015, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    A good hash function should work like a random oracle or a random sponge. It should not have weakness points in neither the construction nor its cipher. DOUBLE-A (The Security) paper is the complimentary of DOUBLE-A (The Design). It explains the idea of each attack on the cipher and construction of it and how the attacks fit hash function. This paper analyzes the security of the DOUBLE-A hash func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Mobile E-Groceries Model

    Publication Year: 2015, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    In a traditional groceries market, various business models have been implemented. Most of these models failed due to e-grocery retailing process. This has led to many inefficient operation of the groceries market in many parts of the world. Previous studies have shown the application and success of e-Groceries system in a web based scheme. This paper tries to develop a prototype for e-Groceries sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing and Modeling the Influence of Workpiece Thickness on Geometry of Slot Machining Wire EDMs

    Publication Year: 2015, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Wire erosion discharge machining is one of the non-traditional machining processes which use heat energy of spark to remove material from work piece. Process parameters have given the major influence of the cutting performance on wire EDM. Parameters such as pulse on time, peak current, wire diameter and discharge current are well known for their effect surface roughness and recast layer. The pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Review on Content-Based Image Retrieval Representation and Description for Fish

    Publication Year: 2015, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    There is an increasing interest in the description and representation of fish species images. For that purpose, Content-based Image Retrieval (CBIR) is applied. Due to the uncontrolled deep sea underwater environment, it is very hard to accurately estimate the similarities between the fishes and retrieves them according to its species due to ineffective visual features extraction for fish image re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impersonate Affecting Users' Attitude toward Facebook in Egypt

    Publication Year: 2015, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Social networking sites such as Facebook have mushroomed very rapidly. Anyone with an email address can make an account as long as he accepts the terms and conditions of the website regarding privacy. There are several pages of celebrities, public figures and famous personalities being tricked by hackers on the Web. The real problem arises when a subscriber follows the wrong page taking it as real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Technology Generations and Cryptographic Algorithms: Analysis Study

    Publication Year: 2015, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Nowadays, Mobile wireless technologies are becoming more significant and growing rapidly for better features and services. Latest Mobile technologies are expected to provide higher processing power, support high quality multimedia applications, offer reliable wireless connections, faster data transmission rates, and consume less power. At the same time, various mobile generations are susceptible t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm Based on Artificial Bee Colony Algorithm for Energy Demand Forecasting in Turkey

    Publication Year: 2015, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    In this study, an energy demand forecasting algorithm based on the Artificial Bee Colony with Variable Search Strategies (ABCVSS) method was proposed in order to determine Turkey's long-term energy demand. Linear and quadratic equations were used for energy demand forecasting and the coefficients of the equations were determined by means of the ABCVSS method. With the ABCVSS method, an attempt was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying AWGN MP3 Steganography Attack in BiLSB and SLSB Techniques

    Publication Year: 2015, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Steganography is considered as an advanced emerging method due to its ability to ensure secured data transmission based on embedding the required secret data in digital multimedia files. The most appropriate mediums for steganography is audio files because of its high rates of data transmission and high redundancy level. Various steganography methods have been introduced to ensure the transmission... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of Improved Bat Algorithm and Bat Algorithm on Numerical Benchmarks

    Publication Year: 2015, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Optimization is employed in solutions of many problems today. Optimization is described as finding the most suitable alternative among many others under the given constraints. Meta-heuristic algorithms used in solutions of the problems are developed upon the behaviors of living creatures in the nature. One of these is Bat Algorithm (BA), an optimization method based on swarm intelligence. BA is a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an Opinion Blog Mining System

    Publication Year: 2015, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    Current search engines apply numerous innovative searching methods that are adhered to retrieve documents or web pages containing certain queried keywords along with their synonyms. Alternatively, the user might be interested in not just finding relevant documents or web pages to a query but also extracting the opinions or reviews commented previously on some topic, this is called opinion mining. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical Analysis of the eSTREAM Competition Winners

    Publication Year: 2015, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    eSTREAM is a project that was developed over a period of several years. It had the objective of activating the research area of analysis and design of stream ciphers. At the end of this project, seven stream ciphers were selected as the winners. These ciphers were subjected to rigorous cryptanalysis and have resulted in the enhancement of overall understanding of stream cipher design. In previous ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.