首页 > 最新文献

Future Computing and Informatics Journal最新文献

英文 中文
Intelligent Technique for Automating the Conversion between Major and Minor Melodies 大调与小调自动转换的智能技术
Pub Date : 2020-09-29 DOI: 10.54623/fue.fcij.4.2.2
Naguib J. Siphocly, El-Sayed M. El-Horbaty, A. M. Salem
Nowadays, computers are extremely beneficial to music composers. Computer music generation tools are developed for aiding composers in producing satisfying musical pieces. The automation of music composition tasks is a challenging research point, specially to the field of Artificial Intelligence. Converting melodies that are played on a major scale to minor (or vice versa) is interesting to both composers and music listeners. Newly converted melodies of famous songs, either from major to minor or the opposite, are becoming blockbusters on the social media. In this paper we propose an intelligent method for automating the conversion between major and minor melodies using Artificial Intelligence techniques. We run our experiments on melodies in the MIDI format which is a standard music format enabling the communication between computers and various musical devices. We also propose a smart method for musical scale detection for the input melodies. Scale detection is a critical step for correctly converting between major and minor melodies. Additionally, this step is also important as a pre-processing step in various other music retrieval or transformation applications.
如今,电脑对音乐作曲家来说是非常有益的。计算机音乐生成工具的开发是为了帮助作曲家制作令人满意的音乐作品。音乐创作任务的自动化是一个具有挑战性的研究点,特别是在人工智能领域。将大调音阶转换成小调(反之亦然)对作曲家和音乐听众来说都很有趣。在社交媒体上,从大调到小调或相反的著名歌曲的新旋律正在成为热门话题。本文提出了一种利用人工智能技术实现大调和小调自动转换的智能方法。我们在MIDI格式的旋律上进行实验,这是一种标准的音乐格式,可以在计算机和各种音乐设备之间进行通信。我们还提出了一种对输入旋律进行音阶检测的智能方法。音阶检测是正确转换大调和小调的关键步骤。此外,这一步在各种其他音乐检索或转换应用程序中作为预处理步骤也很重要。
{"title":"Intelligent Technique for Automating the Conversion between Major and Minor Melodies","authors":"Naguib J. Siphocly, El-Sayed M. El-Horbaty, A. M. Salem","doi":"10.54623/fue.fcij.4.2.2","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.2.2","url":null,"abstract":"Nowadays, computers are extremely beneficial to music composers. Computer music generation tools are developed for aiding composers in producing satisfying musical pieces. The automation of music composition tasks is a challenging research point, specially to the field of Artificial Intelligence. Converting melodies that are played on a major scale to minor (or vice versa) is interesting to both composers and music listeners. Newly converted melodies of famous songs, either from major to minor or the opposite, are becoming blockbusters on the social media. In this paper we propose an intelligent method for automating the conversion between major and minor melodies using Artificial Intelligence techniques. We run our experiments on melodies in the MIDI format which is a standard music format enabling the communication between computers and various musical devices. We also propose a smart method for musical scale detection for the input melodies. Scale detection is a critical step for correctly converting between major and minor melodies. Additionally, this step is also important as a pre-processing step in various other music retrieval or transformation applications.","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83744677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Psychological Personality Classification Approaches 心理人格分类方法综述
Pub Date : 2020-09-29 DOI: 10.54623/fue.fcij.4.2.3
Mervat Ragab Bakry, Mona M. Nasr, Fahad Kamal Al-sheref
Online social networks (OSNs) have become essential ways for users to socially share information and feelings, communicate, and thoughts with others through online social networks. Online social networks such as Twitter and Facebook are some of the most common OSNs among users. Users’ behaviors on social networks aid researchers for detecting and understanding their online behaviors and personality traits. Personality detection is one of the new difficulties in social networks. Machine learning techniques are used to build models for understanding personality, detecting personality traits, and classifying users into different kinds through user generated content based on different features and measures of psychological models such as PEN (Psychoticism, Extraversion, and Neuroticism) model, DISC (Dominance, Influence, Steadiness, and Compliance) model, and the Big-five model (Openness, Extraversion, Consciousness, Agreeableness, and Neurotic) which is the most accepted model of personality. This survey discusses the existing works on psychological personality classification.
在线社交网络(Online social network,简称osn)已经成为用户通过在线社交网络与他人分享信息和感受、交流思想的重要方式。Twitter和Facebook等在线社交网络是用户最常用的osn。用户在社交网络上的行为有助于研究人员发现和理解他们的在线行为和人格特征。人格检测是社交网络的新难点之一。基于PEN (Psychoticism, Extraversion, Neuroticism)模型、DISC (Dominance, Influence, Steadiness, and Compliance)模型、Big-five (Openness, Extraversion, Consciousness, Agreeableness)模型等心理模型的不同特征和度量,利用机器学习技术构建理解人格、检测人格特征的模型,并通过用户生成的内容将用户分类为不同的类型。和神经质),这是最被接受的人格模型。本文对现有的心理人格分类研究进行了综述。
{"title":"A Survey of Psychological Personality Classification Approaches","authors":"Mervat Ragab Bakry, Mona M. Nasr, Fahad Kamal Al-sheref","doi":"10.54623/fue.fcij.4.2.3","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.2.3","url":null,"abstract":"Online social networks (OSNs) have become essential ways for users to socially share information and feelings, communicate, and thoughts with others through online social networks. Online social networks such as Twitter and Facebook are some of the most common OSNs among users. Users’ behaviors on social networks aid researchers for detecting and understanding their online behaviors and personality traits. Personality detection is one of the new difficulties in social networks. Machine learning techniques are used to build models for understanding personality, detecting personality traits, and classifying users into different kinds through user generated content based on different features and measures of psychological models such as PEN (Psychoticism, Extraversion, and Neuroticism) model, DISC (Dominance, Influence, Steadiness, and Compliance) model, and the Big-five model (Openness, Extraversion, Consciousness, Agreeableness, and Neurotic) which is the most accepted model of personality. This survey discusses the existing works on psychological personality classification.","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"111 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91553841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontological Engineering For Source Code Generation 源代码生成的本体工程
Pub Date : 2020-09-29 DOI: 10.54623/fue.fcij.4.2.1
Anas Alokla, Walaa K. Gad, M. Aref, A. M. Salem
Source Code Generation (SCG) is the sub-domain of the Automatic Programming (AP) that helps programmers to program using high-level abstraction. Recently, many researchers investigated many techniques to access SCG. The problem is to use the appropriate technique to generate the source code due to its purposes and the inputs. This paper introduces a review and an analysis related SCG techniques. Moreover, comparisons are presented for: techniques mapping, Natural Language Processing (NLP), knowledgebase, ontology, Specification Configuration Template (SCT) model and deep learning.
源代码生成(SCG)是自动编程(AP)的子领域,它帮助程序员使用高级抽象进行编程。近年来,许多研究者研究了多种获取SCG的技术。问题在于根据源代码的目的和输入使用适当的技术来生成源代码。本文对SCG相关技术进行了综述和分析。对技术映射、自然语言处理(NLP)、知识库、本体、规范配置模板(SCT)模型和深度学习进行了比较。
{"title":"Ontological Engineering For Source Code Generation","authors":"Anas Alokla, Walaa K. Gad, M. Aref, A. M. Salem","doi":"10.54623/fue.fcij.4.2.1","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.2.1","url":null,"abstract":"Source Code Generation (SCG) is the sub-domain of the Automatic Programming (AP) that helps programmers to program using high-level abstraction. Recently, many researchers investigated many techniques to access SCG. The problem is to use the appropriate technique to generate the source code due to its purposes and the inputs. This paper introduces a review and an analysis related SCG techniques. Moreover, comparisons are presented for: techniques mapping, Natural Language Processing (NLP), knowledgebase, ontology, Specification Configuration Template (SCT) model and deep learning.","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73271355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study for Methodologies and Algorithms Used In Colon Cancer Diagnoses and Detection 结肠癌诊断与检测方法与算法的比较研究
Pub Date : 2020-09-29 DOI: 10.54623/fue.fcij.4.2.6
Mona Nasr, Laila Abdelhamid, NaglaaSaeed Shehata
Colon cancer is also referred to as colorectal cancer, a kind of cancer that starts with colon damage to the large intestine in the last section of the digestive tract. Elderly people typically suffer from colon cancer, but this may occur at any age.It normally starts as little, noncancerous (benign) mass of cells named polyps that structure within the colon. After a period of time these polyps can turn into advanced malignant tumors that attack the human body and some of these polyps can become colon cancers. So far, no concrete causes have been identified and the complete cancer treatment is very difficult to be detected by doctors in the medical field. Colon cancer often has no symptoms in early stage so detecting it at this stage is curable but colorectal cancer diagnosis in the final stages (stage IV), gives it the opportunity to spread to different pieces of the body, difficult to treat successfully, and the person's chances of survival are much lower. False diagnosis of colorectal cancer which mean wrong treatment for patients with long-term infections and they are suffering from colon cancer this causing the death for these patients. Also, the cancer treatment needs more time and a lot of money. This paper provides a comparative study for methodologies and algorithms used in colon cancer diagnoses and detection this can help for proposing a prediction for risk levels of colon cancer disease using CNN algorithm of the deep learning (Convolutional Neural Networks Algorithm).
结肠癌也被称为结直肠癌,这是一种始于消化道最后一段大肠的结肠损伤的癌症。老年人通常患有结肠癌,但这可能发生在任何年龄。它通常开始于微小的,非癌性的(良性)细胞团,称为息肉,在结肠内结构。一段时间后,这些息肉会发展为侵袭人体的晚期恶性肿瘤,其中一些息肉会发展为结肠癌。到目前为止,还没有确定具体的原因,医学领域的医生很难发现完整的癌症治疗方法。结肠癌在早期通常没有任何症状,因此在这个阶段检测出来是可以治愈的,但在最后阶段(第四阶段)诊断出结直肠癌,使其有机会扩散到身体的不同部位,很难成功治疗,患者的生存机会也要低得多。对结肠直肠癌的错误诊断意味着对长期感染的患者进行错误的治疗他们患有结肠癌这导致了这些患者的死亡。此外,癌症治疗需要更多的时间和大量的金钱。本文对结肠癌诊断和检测中使用的方法和算法进行了比较研究,有助于提出使用深度学习中的CNN算法(卷积神经网络算法)预测结肠癌疾病的风险水平。
{"title":"A Comparative Study for Methodologies and Algorithms Used In Colon Cancer Diagnoses and Detection","authors":"Mona Nasr, Laila Abdelhamid, NaglaaSaeed Shehata","doi":"10.54623/fue.fcij.4.2.6","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.2.6","url":null,"abstract":"Colon cancer is also referred to as colorectal cancer, a kind of cancer that starts with colon damage to the large intestine in the last section of the digestive tract. Elderly people typically suffer from colon cancer, but this may occur at any age.It normally starts as little, noncancerous (benign) mass of cells named polyps that structure within the colon. After a period of time these polyps can turn into advanced malignant tumors that attack the human body and some of these polyps can become colon cancers. So far, no concrete causes have been identified and the complete cancer treatment is very difficult to be detected by doctors in the medical field. Colon cancer often has no symptoms in early stage so detecting it at this stage is curable but colorectal cancer diagnosis in the final stages (stage IV), gives it the opportunity to spread to different pieces of the body, difficult to treat successfully, and the person's chances of survival are much lower. False diagnosis of colorectal cancer which mean wrong treatment for patients with long-term infections and they are suffering from colon cancer this causing the death for these patients. Also, the cancer treatment needs more time and a lot of money. This paper provides a comparative study for methodologies and algorithms used in colon cancer diagnoses and detection this can help for proposing a prediction for risk levels of colon cancer disease using CNN algorithm of the deep learning (Convolutional Neural Networks Algorithm).","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"129 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73621675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposed Framework for Smart Healthcare Services 智能医疗保健服务建议框架
Pub Date : 2020-09-29 DOI: 10.54623/fue.fcij.4.2.4
Dalia Rizk, Hoda Hosny Prof. Dr., El-Sayed M. El-Horbaty Prof. Dr., Abdel-Badeeh M. Salem Prof. Dr.
Smart healthcare is of great interest to researchers and governments due to the increasing development of new smart cities. However, there is no current standard practice to format the cloud computing infrastructure and to assist the healthcare system architect in designing a comprehensive solution for the basic services that are required by the healthcare users while taking into consideration a balanced approach towards their specific functional and non-functional needs such as openness, scalability, concurrency, interoperability and security factors. The integration of smart healthcare services with cloud computing needs a concrete framework. The main objective of this paper is to analyze the different frameworks that discuss smart healthcare services and reach to a conclusion of the common factors to arrive at a unified and smart framework
由于新型智慧城市的不断发展,智能医疗引起了研究人员和政府的极大兴趣。但是,目前还没有标准实践来格式化云计算基础设施,并协助医疗保健系统架构师为医疗保健用户所需的基本服务设计全面的解决方案,同时考虑到对其特定功能和非功能需求(如开放性、可伸缩性、并发性、互操作性和安全因素)采取平衡的方法。智能医疗服务与云计算的集成需要一个具体的框架。本文的主要目的是分析讨论智能医疗服务的不同框架,并得出共同因素的结论,以得出统一的智能框架
{"title":"Proposed Framework for Smart Healthcare Services","authors":"Dalia Rizk, Hoda Hosny Prof. Dr., El-Sayed M. El-Horbaty Prof. Dr., Abdel-Badeeh M. Salem Prof. Dr.","doi":"10.54623/fue.fcij.4.2.4","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.2.4","url":null,"abstract":"Smart healthcare is of great interest to researchers and governments due to the increasing development of new smart cities. However, there is no current standard practice to format the cloud computing infrastructure and to assist the healthcare system architect in designing a comprehensive solution for the basic services that are required by the healthcare users while taking into consideration a balanced approach towards their specific functional and non-functional needs such as openness, scalability, concurrency, interoperability and security factors. The integration of smart healthcare services with cloud computing needs a concrete framework. The main objective of this paper is to analyze the different frameworks that discuss smart healthcare services and reach to a conclusion of the common factors to arrive at a unified and smart framework","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81563127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Techniques for Credit Card Fraud Detection 信用卡欺诈检测的机器学习技术
Pub Date : 2020-09-29 DOI: 10.54623/fue.fcij.4.2.5
Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, W. Khalifa, Mohamed Roushdy, A. Salem
The term “fraud”, it always concerned about credit card fraud in our minds. And after the significant increase in the transactions of credit card, the fraud of credit card increased extremely in last years. So the fraud detection should include surveillance of the spending attitude for the person/customer to the determination, avoidance, and detection of unwanted behavior. Because the credit card is the most payment predominant way for the online and regular purchasing, the credit card fraud raises highly. The Fraud detection is not only concerned with capturing of the fraudulent practices, but also, discover it as fast as they can, because the fraud costs millions of dollar business loss and it is rising over time, and that affects greatly the worldwide economy. . In this paper we introduce 14 different techniques of how data mining techniques can be successfully combined to obtain a high fraud coverage with a high or low false rate, the Advantage and The Disadvantages of every technique, and The Data Sets used in the researches by researcher
“诈骗”一词,在我们的脑海中总是让人关注到信用卡诈骗。而在信用卡交易量大幅增加之后,近年来信用卡诈骗案件急剧增加。因此,欺诈检测应包括监视个人/客户的消费态度,以确定,避免和发现不必要的行为。由于信用卡是人们在网上和日常购物中最主要的支付方式,信用卡诈骗案也随之高发。欺诈检测不仅涉及捕获欺诈行为,而且还涉及尽快发现欺诈行为,因为欺诈行为造成数百万美元的商业损失,并且随着时间的推移而增加,这极大地影响了全球经济。在本文中,我们介绍了14种不同的数据挖掘技术如何成功地结合起来,以获得高欺诈覆盖率和高或低错误率,每种技术的优点和缺点,以及研究人员在研究中使用的数据集
{"title":"Machine Learning Techniques for Credit Card Fraud Detection","authors":"Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, W. Khalifa, Mohamed Roushdy, A. Salem","doi":"10.54623/fue.fcij.4.2.5","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.2.5","url":null,"abstract":"The term “fraud”, it always concerned about credit card fraud in our minds. And after the significant increase in the transactions of credit card, the fraud of credit card increased extremely in last years. So the fraud detection should include surveillance of the spending attitude for the person/customer to the determination, avoidance, and detection of unwanted behavior. Because the credit card is the most payment predominant way for the online and regular purchasing, the credit card fraud raises highly. The Fraud detection is not only concerned with capturing of the fraudulent practices, but also, discover it as fast as they can, because the fraud costs millions of dollar business loss and it is rising over time, and that affects greatly the worldwide economy. . In this paper we introduce 14 different techniques of how data mining techniques can be successfully combined to obtain a high fraud coverage with a high or low false rate, the Advantage and The Disadvantages of every technique, and The Data Sets used in the researches by researcher","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75302258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A General Approach Students’ Attitude towards to Virtual Reality Technology in Distance Education Environment 远程教育环境下学生对虚拟现实技术的态度
Pub Date : 2019-06-24 DOI: 10.54623/fue.fcij.4.1.2
M. Abdelsalam
E-learning has become a prominent and effective role in recent years. The factor of place and time became ineffective in the educational process. So that anyone can learn anywhere in the world. The educational services that benefit the learner during the educational process as well as the factors of assistance are important elements that help in the success of the educational process in the environment of e-learning. The more these services, the greater the benefit from e-learning. But its way of reviewing electronic content is still ineffective. Therefore it was necessary to create a suitable environment for the learner is similar to the real reality. Through which the learner feels the integration and concentration in the academic content as if it were realistic. So, the trend was to take advantage of the virtual reality technology that have become effective in all fields. The use of this technology will help the learner gain more realism and make full use of the electronic content. This study reviews the effect of the use of virtual reality technology in the review of the learner's electronic content, as well as the attitudes and opinions of the students of the Business Information Systems program at the Faculty of Commerce, Helwan University, Cairo, Egypt, about the use of this technology and to what extent will effect on change and effectiveness in the quality of educational process
近年来,网络学习已经成为一个突出而有效的角色。地点和时间因素在教育过程中变得无效。这样任何人都可以在世界上任何地方学习。在教育过程中对学习者有利的教育服务和辅助因素是电子学习环境下教育过程成功的重要因素。这些服务越多,电子学习的好处就越大。但它审查电子内容的方式仍然是无效的。因此,有必要为学习者创造一个与现实相似的适宜环境。通过这种方式,学习者可以感受到学术内容的整合和集中,就好像它是真实的一样。因此,利用已在各个领域发挥作用的虚拟现实技术是趋势。该技术的使用将有助于学习者获得更多的真实感,并充分利用电子内容。本研究回顾了虚拟现实技术在学习者电子内容审查中的使用效果,以及埃及开罗赫尔万大学商学院商业信息系统专业学生对该技术使用的态度和意见,以及该技术将在多大程度上影响教育过程质量的变化和有效性
{"title":"A General Approach Students’ Attitude towards to Virtual Reality Technology in Distance Education Environment","authors":"M. Abdelsalam","doi":"10.54623/fue.fcij.4.1.2","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.1.2","url":null,"abstract":"E-learning has become a prominent and effective role in recent years. The factor of place and time became ineffective in the educational process. So that anyone can learn anywhere in the world. The educational services that benefit the learner during the educational process as well as the factors of assistance are important elements that help in the success of the educational process in the environment of e-learning. The more these services, the greater the benefit from e-learning. But its way of reviewing electronic content is still ineffective. Therefore it was necessary to create a suitable environment for the learner is similar to the real reality. Through which the learner feels the integration and concentration in the academic content as if it were realistic. So, the trend was to take advantage of the virtual reality technology that have become effective in all fields. The use of this technology will help the learner gain more realism and make full use of the electronic content. This study reviews the effect of the use of virtual reality technology in the review of the learner's electronic content, as well as the attitudes and opinions of the students of the Business Information Systems program at the Faculty of Commerce, Helwan University, Cairo, Egypt, about the use of this technology and to what extent will effect on change and effectiveness in the quality of educational process","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78483378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved RSA security using Chinese Remainder Theorem and Multiple Keys 利用中文剩余定理和多密钥改进RSA安全性
Pub Date : 2019-06-24 DOI: 10.54623/fue.fcij.4.1.1
Hatem Abdulkader, Rasha Samir, Reda M. Hussien
Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non readable, to secure data information transmits over the network, In this paper introduced modified RSA approach based on multi keys and Chinese remainder theorem (CRT), which RSA algorithm is asymmetric key encryption technique. The objective of this Technique is to provide secure transmission of data between any networks. Which is the Network security is an activity which is designed to provide the usage protection and integrity of the Network and data. So that only the user allowed can read and process it, the objective of this paper Enhancement the performance of RSA and increase the security. In proposed model RSA will be implemented using java.
如今,人们对计算机和网络有着极大的依赖,计算机的安全关系到整个世界和每一个人。密码学是通过对信息进行编码使其不可读来实现安全的艺术和科学,以保证网络上传输的数据信息的安全。本文介绍了基于多密钥和中国剩余定理(CRT)的改进RSA方法,其中RSA算法是一种非对称密钥加密技术。该技术的目标是在任何网络之间提供安全的数据传输。网络安全是一项旨在提供网络和数据的使用保护和完整性的活动。使得只有被允许的用户才能读取和处理它,从而提高RSA的性能和安全性。在提议的模型中,RSA将使用java实现。
{"title":"Improved RSA security using Chinese Remainder Theorem and Multiple Keys","authors":"Hatem Abdulkader, Rasha Samir, Reda M. Hussien","doi":"10.54623/fue.fcij.4.1.1","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.1.1","url":null,"abstract":"Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non readable, to secure data information transmits over the network, In this paper introduced modified RSA approach based on multi keys and Chinese remainder theorem (CRT), which RSA algorithm is asymmetric key encryption technique. The objective of this Technique is to provide secure transmission of data between any networks. Which is the Network security is an activity which is designed to provide the usage protection and integrity of the Network and data. So that only the user allowed can read and process it, the objective of this paper Enhancement the performance of RSA and increase the security. In proposed model RSA will be implemented using java.","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"14 Dermatol Sect 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82955596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Concept Map Approach for Software Requirements Validation 软件需求验证的自适应概念图方法
Pub Date : 2019-06-24 DOI: 10.54623/fue.fcij.4.1.4
Ahmed A. Ahmed, Ayman E. Khedr, S. Kholeif
Requirements validation is one of the most significant and critical parts of the requirements engineering. This activity ensures that the set of requirements is accurate, right, complete, and consistent. Requirements validation is considered as the key activity because mistakes found in a software requirements document can lead to extensive rework costs when they are discovered either during development or after the system is in service. There are some commonly used bases to validate user requirements such as: Natural language, Design description languages, Graphical notations and Mathematical specification languages. Whereas the graphical notations are the most suitable means to be used in software requirements validation because it is easy to understand, and it can be easily created by analyst and time took. Therefore, this paper adopts the map concept which is a graphical technique for discovering the hidden flaws in software requirements in the early phases of software development lifecycle.
需求确认是需求工程中最重要和最关键的部分之一。此活动确保需求集是准确、正确、完整和一致的。需求验证被认为是关键的活动,因为在软件需求文档中发现的错误可能会导致大量的返工成本,无论是在开发期间还是在系统投入使用之后。有一些常用的基础来验证用户需求,如:自然语言、设计描述语言、图形符号和数学规范语言。然而,图形符号是最适合用于软件需求验证的方法,因为它易于理解,并且可以很容易地由分析人员创建,并且花费时间。因此,本文采用了地图的概念,这是一种在软件开发生命周期的早期发现软件需求中隐藏缺陷的图形化技术。
{"title":"Adaptive Concept Map Approach for Software Requirements Validation","authors":"Ahmed A. Ahmed, Ayman E. Khedr, S. Kholeif","doi":"10.54623/fue.fcij.4.1.4","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.1.4","url":null,"abstract":"Requirements validation is one of the most significant and critical parts of the requirements engineering. This activity ensures that the set of requirements is accurate, right, complete, and consistent. Requirements validation is considered as the key activity because mistakes found in a software requirements document can lead to extensive rework costs when they are discovered either during development or after the system is in service. There are some commonly used bases to validate user requirements such as: Natural language, Design description languages, Graphical notations and Mathematical specification languages. Whereas the graphical notations are the most suitable means to be used in software requirements validation because it is easy to understand, and it can be easily created by analyst and time took. Therefore, this paper adopts the map concept which is a graphical technique for discovering the hidden flaws in software requirements in the early phases of software development lifecycle.","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"157 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77762133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity Evaluation Based on Contextual Modelling 基于上下文建模的相似性评价
Pub Date : 2019-06-24 DOI: 10.54623/fue.fcij.4.1.5
Mohamed H. Haggag, Marwa M. A. ELFattah, Ahmed Mohammed Ahmed
Measuring Text similarity problem still one of opened fields for research area in natural language processing and text related research such as text mining, Web page retrieval, information retrieval and textual entailment. Several measures have been developed for measuring similarity between two texts: such as Wu and Palmer, Leacock and Chodorow measure and others . But these measures do not take into consideration the contextual information of the text .This paper introduces new model for measuring semantic similarity between two text segments. This model is based on building new contextual structure for extracting semantic similarity. This approach can contribute in solving many NLP problems such as te xt entailment and information retrieval fields.
文本相似度度量问题仍然是自然语言处理和文本挖掘、网页检索、信息检索、文本蕴涵等文本相关研究领域的研究热点之一。已经开发了几种测量两个文本之间相似性的方法:如Wu和Palmer, Leacock和Chodorow测量等。但是这些度量方法没有考虑到文本的语境信息,本文提出了一种新的文本段语义相似度度量模型。该模型基于构建新的上下文结构来提取语义相似度。这种方法有助于解决文本蕴涵和信息检索领域的许多NLP问题。
{"title":"Similarity Evaluation Based on Contextual Modelling","authors":"Mohamed H. Haggag, Marwa M. A. ELFattah, Ahmed Mohammed Ahmed","doi":"10.54623/fue.fcij.4.1.5","DOIUrl":"https://doi.org/10.54623/fue.fcij.4.1.5","url":null,"abstract":"Measuring Text similarity problem still one of opened fields for research area in natural language processing and text related research such as text mining, Web page retrieval, information retrieval and textual entailment. Several measures have been developed for measuring similarity between two texts: such as Wu and Palmer, Leacock and Chodorow measure and others . But these measures do not take into consideration the contextual information of the text .This paper introduces new model for measuring semantic similarity between two text segments. This model is based on building new contextual structure for extracting semantic similarity. This approach can contribute in solving many NLP problems such as te xt entailment and information retrieval fields.","PeriodicalId":100561,"journal":{"name":"Future Computing and Informatics Journal","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83497533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Future Computing and Informatics Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1