Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Future Computing and Informatics Journal

Discipline
Keyword

Articles 1 - 30 of 70

Full-Text Articles in Engineering

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi Dec 2020

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi

Future Computing and Informatics Journal

Sickle cell disease is a severe hereditary disease caused by an abnormality of the red blood cells. The current therapeutic decision-making process applied to sickle cell disease includes monitoring a patient’s symptoms and complications and then adjusting the treatment accordingly. This process is time-consuming, which might result in serious consequences for patients’ lives and could lead to irreversible disease complications. Artificial intelligence, specifically machine learning, is a powerful technique that has been used to support medical decisions. This paper aims to review the recently developed machine learning models designed to interpret medical data regarding sickle cell disease. To propose an …


A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany Dec 2020

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany

Future Computing and Informatics Journal

Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …


Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy Dec 2020

Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy

Future Computing and Informatics Journal

Background: Early event detection, monitor, and response can significantly decrease the impact of disasters. Lately, the usage of social media for detecting events has displayed hopeful results. Objectives: for event detection and mapping; the tweets will locate and monitor them on a map. This new approach uses grouped geoparsing then scoring for each tweet based on three spatial indicators. Method/Approach: Our approach uses a geoparsing technique to match a location in tweets to geographic locations of multiple-events tweets in Egypt country, administrative subdivision. Thus, additional geographic information acquired from the tweet itself to detect the actual locations that …


A Comparative Study For Methodologies And Algorithms Used In Colon Cancer Diagnoses And Detection, Mona Mohamed Nasr, Laila Mohamed Abdelhamid, Naglaa Shehata Sep 2020

A Comparative Study For Methodologies And Algorithms Used In Colon Cancer Diagnoses And Detection, Mona Mohamed Nasr, Laila Mohamed Abdelhamid, Naglaa Shehata

Future Computing and Informatics Journal

Colon cancer is also referred to as colorectal cancer; it is a kind of cancer that starts with colon damage to the large intestine in the last section of the digestive tract. Elderly people typically suffer from colon cancer, but this may occur at any age. It normally starts as a little, noncancerous (benign) mass of cells named polyps that structure within the colon. After a period of time these polyps can turn into advanced malignant tumors that attack the human body and some of these polyps can become colon cancers. So far, no concrete causes have been identified and …


Machine Learning Techniques For Credit Card Fraud Detection, Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, Wael Khalifa, Mohamed Ismail Roushdy, Abdel-Badeeh M. Salem Sep 2020

Machine Learning Techniques For Credit Card Fraud Detection, Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, Wael Khalifa, Mohamed Ismail Roushdy, Abdel-Badeeh M. Salem

Future Computing and Informatics Journal

The term “fraud”, it always concerned about credit card fraud in our minds. And after the significant increase in the transactions of credit card, the fraud of credit card increased extremely in last years. So the fraud detection should include surveillance of the spending attitude for the person/customer to the determination, avoidance, and detection of unwanted behavior. Because the credit card is the most payment predominant way for the online and regular purchasing, the credit card fraud raises highly. The Fraud detection is not only concerned with capturing of the fraudulent practices, but also, discover it as fast as they …


Proposed Framework For Smart Healthcare Services, Dalia K. A. A. Rizk, Hoda Hosny Prof. Dr., El-Sayed M. El-Horbaty Prof. Dr., Abdel-Badeeh M. Salem Prof. Dr. Sep 2020

Proposed Framework For Smart Healthcare Services, Dalia K. A. A. Rizk, Hoda Hosny Prof. Dr., El-Sayed M. El-Horbaty Prof. Dr., Abdel-Badeeh M. Salem Prof. Dr.

Future Computing and Informatics Journal

Smart healthcare is of great interest to researchers and governments due to the increasing development of new smart cities. However, there is no current standard practice to format the cloud computing infrastructure and to assist the healthcare system architect in designing a comprehensive solution for the basic services that are required by the healthcare users while taking into consideration a balanced approach towards their specific functional and non-functional needs such as openness, scalability, concurrency, interoperability and security factors. The integration of smart healthcare services with cloud computing needs a concrete framework. The main objective of this paper is to analyze …


Intelligent Technique For Automating The Conversion Between Major And Minor Melodies, Nermin N. J. Siphocly, El-Sayed M. El-Horbaty, Abd El-Badea Mohamed Salem Prof Sep 2020

Intelligent Technique For Automating The Conversion Between Major And Minor Melodies, Nermin N. J. Siphocly, El-Sayed M. El-Horbaty, Abd El-Badea Mohamed Salem Prof

Future Computing and Informatics Journal

Nowadays, computers are extremely beneficial to music composers. Computer music generation tools are developed for aiding composers in producing satisfying musical pieces. The automation of music composition tasks is a challenging research point, specially to the field of Artificial Intelligence. Converting melodies that are played on a major scale to minor (or vice versa) is interesting to both composers and music listeners. Newly converted melodies of famous songs, either from major to minor or the opposite, are becoming blockbusters on the social media. In this paper we propose an intelligent method for automating the conversion between major and minor melodies …


Ontological Engineering For Source Code Generation, Anas Hamid Aloklah, Walaa Gad, Mostafa Mohamed Aref Prof, Abd El-Badea Mohamed Salem Prof Sep 2020

Ontological Engineering For Source Code Generation, Anas Hamid Aloklah, Walaa Gad, Mostafa Mohamed Aref Prof, Abd El-Badea Mohamed Salem Prof

Future Computing and Informatics Journal

Source Code Generation (SCG) is the sub-domain of the Automatic Programming (AP) that helps programmers to program using high-level abstraction. Recently, many researchers investigated many techniques to access SCG. The problem is to use the appropriate technique to generate the source code due to its purposes and the inputs. This paper introduces a review and an analysis related SCG techniques. Moreover, comparisons are presented for: techniques mapping, Natural Language Processing (NLP), knowledge base, ontology, Specification Configuration Template (SCT) model and deep learning


Similarity Evaluation Based On Contextual Modelling, Mohamed H. Haggag, Marwa M. A. Elfattah, Ahmed Mohammed Ahmed Jun 2020

Similarity Evaluation Based On Contextual Modelling, Mohamed H. Haggag, Marwa M. A. Elfattah, Ahmed Mohammed Ahmed

Future Computing and Informatics Journal

Measuring Text similarity problem still one of opened fields for research area in natural language processing and text related research such as text mining, Web page retrieval, information retrieval and textual entailment. Several measures have been developed for measuring similarity between two texts: such as Wu and Palmer, Leacock and Chodorow measure and others . But these measures do not take into consideration the contextual information of the text .This paper introduces new model for measuring semantic similarity between two text segments. This model is based on building new contextual structure for extracting semantic similarity. This approach can contribute in …


Adaptive Concept Map Approach For Software Requirements Validation, Ayman Khedr, Ahmed A. Ahmed, Sherif Kholeif Jun 2020

Adaptive Concept Map Approach For Software Requirements Validation, Ayman Khedr, Ahmed A. Ahmed, Sherif Kholeif

Future Computing and Informatics Journal

Requirements validation is one of the most significant and critical parts of the requirements engineering. This activity ensures that the set of requirements is accurate, right, complete, and consistent. Requirements validation is considered as the key activity because mistakes found in a software requirements document can lead to extensive rework costs when they are discovered either during development or after the system is in service. There are some commonly used bases to validate user requirements such as: Natural language, Design description languages, Graphical notations and Mathematical specification languages. Whereas the graphical notations are the most suitable means to be used …


Generic Approach For Customer Management System, Esraa A. Afify, Mona A. Kadry Jun 2020

Generic Approach For Customer Management System, Esraa A. Afify, Mona A. Kadry

Future Computing and Informatics Journal

Customer Complaints are considered as valuable and significant information that can be utilized to attain customer satisfaction. Accordingly, a complaint handling system can address customer dissatisfaction and prevent similar problems from reoccurring. The aim of this paper is to investigate the level of relationship between the complaints and complaint behaviours of the customers who benefit from the services offered. In this paper, a generic approach for the Customer Complaint Management System is pro posed to have the ability to minimize customers’ dissatisfaction and on the other hand to motivate customers to take part of controlling the quality of the services …


A General Approach Students’ Attitude Towards To Virtual Reality Technology In Distance Education Environment, Osama Emam, Mohamed Abdelsalam, Ayman E. Khedr, Yehia Helmy Jun 2020

A General Approach Students’ Attitude Towards To Virtual Reality Technology In Distance Education Environment, Osama Emam, Mohamed Abdelsalam, Ayman E. Khedr, Yehia Helmy

Future Computing and Informatics Journal

E-learning has become a prominent and effective role in recent years. The factor of place and time became ineffective in the educational process. So that anyone can learn anywhere in the world. The educational services that benefit the learner during the educational process as well as the factors of assistance are important elements that help in the success of the educational process in the environment of e-learning. The more these services, the greater the benefit from e-learning. But its way of reviewing electronic content is still ineffective. Therefore it was necessary to create a suitable environment for the learner is …


Improved Rsa Security Using Chinese Remainder Theorem And Multiple Keys, Hatem Abdulkader, Rasha Samir, Reda Hussien Jun 2020

Improved Rsa Security Using Chinese Remainder Theorem And Multiple Keys, Hatem Abdulkader, Rasha Samir, Reda Hussien

Future Computing and Informatics Journal

Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non readable, to secure data information transmits over the network, In this paper introduced modified RSA approach based on multi keys and Chinese remainder theorem (CRT), which RSA algorithm is asymmetric key encryption technique. The objective of this Technique is to provide secure transmission of data between any networks. Which is the Network security is an activity which is designed to provide …


Smart Drugs:Improving Healthcare Using Smart Pill Box For Medicine Reminder And Monitoring System, Diaa Salama Abdul Minaam, Mohamed Abd-Elfattah Jun 2020

Smart Drugs:Improving Healthcare Using Smart Pill Box For Medicine Reminder And Monitoring System, Diaa Salama Abdul Minaam, Mohamed Abd-Elfattah

Future Computing and Informatics Journal

Many medical errors are due to the fact that people in charge of patient or elder's medication have to deal with sorting huge amounts of pills each day. This paper consists on the conception, design and creation of a pillbox prototype intended to solve this deficiency in the medical area as it has the ability of sorting out the pills by itself as well as many other advanced features, with this device being intended to be used by hospitals or retirement homes. This medication pill box is focused on patients who frequently take medications or vitamin supplements, or attendants who …


Antlion Optimization And Boosting Classifier For Spam Email Detection, Amany A. Naem, Neveen I. Ghali Prof., Afaf A. Saleh Jun 2020

Antlion Optimization And Boosting Classifier For Spam Email Detection, Amany A. Naem, Neveen I. Ghali Prof., Afaf A. Saleh

Future Computing and Informatics Journal

Spam emails are not necessary, though they are harmful as they include viruses and spyware, so there is an emerging need for detecting spam emails. Several methods for detecting spam emails were suggested based on the methods of machine learning, which were submitted to reduce non relevant emails and get results of high precision for spam email classification. In this work, a new predictive method is submitted based on antlion optimization (ALO) and boosting termed as ALO-Boosting for solving spam emails problem. ALO is a computational model imitates the preying technicality of antlions to ants in the life cycle. Where …


A New Online Scheduling Approach For Enhancing Qos In Cloud, Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed Jun 2020

A New Online Scheduling Approach For Enhancing Qos In Cloud, Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed

Future Computing and Informatics Journal

Quality-of-Services (QoS) is one of the most important requirements of cloud users. So, cloud providers continuously try to enhance cloud management tools to guarantee the required QoS and provide users the services with high quality. One of the most important management tools which play a vital role in enhancing QoS is scheduling. Scheduling is the process of assigning users’ tasks into available Virtual Machines (VMs). This paper presents a new task scheduling approach, called Online Potential Finish Time (OPFT), to enhance the cloud data-center broker, which is responsible for the scheduling process, and solve the QoS issue. The main idea …


Automatic Labeling Of Hidden Web Data Using Multi-Heuristics Annotator, Umamageswari Baskaran, R. Kalpana Jun 2020

Automatic Labeling Of Hidden Web Data Using Multi-Heuristics Annotator, Umamageswari Baskaran, R. Kalpana

Future Computing and Informatics Journal

Hidden web contains huge amount of high quality data which are not indexed to search engines. Hidden web refers to web pages which are generated dynamically by embedding backend data matching the search keywords, in server-side templates. They are created for human consumption and makes automated processing cumbersome since structured data is embedded within unstructured HTML tags. In order to enable machine processing, structured data must be detected, extracted and annotated. Many heuristic based approaches DeLa [1], MSAA [2] are available in the literature to perform automatic annotation. Most of these techniques fail if data values didn't contain labels present …


A Systematic Review For The Determination And Classification Of The Crm Critical Success Factors Supporting With Their Metrics, Mahmoud Abd Ellatif, Marwa Salah Farhan, Amira Hassan Abed Jun 2020

A Systematic Review For The Determination And Classification Of The Crm Critical Success Factors Supporting With Their Metrics, Mahmoud Abd Ellatif, Marwa Salah Farhan, Amira Hassan Abed

Future Computing and Informatics Journal

The successful implementation of customer relationship management (CRM) is not easy and seems to be a complex task. Almost about 70% of all CRM implementation projects fail to achieve their expected objectives. Therefore, most researchers and information systems developers concentrate on the critical success factors approach which can enhance the success of CRM implementation and turn the failure and drawbacks faced CRM into successful CRM systems adoption and implementation. In this paper, the number of the previous studies is reviewed to demonstrate the barriers behind this high failure rate. In addition, an extensive review is conducted in order to identify …


Stage – Specific Predictive Models For Main Prognosis Measures Of Breast Cancer, Ahmed Attia Said, Laila A. Abd-Elmegid, Sherif Kholeif, Ayman Abdelsamie Gaber Jun 2020

Stage – Specific Predictive Models For Main Prognosis Measures Of Breast Cancer, Ahmed Attia Said, Laila A. Abd-Elmegid, Sherif Kholeif, Ayman Abdelsamie Gaber

Future Computing and Informatics Journal

Breast cancer is a malignant tumor that starts in the cells of the breast. A malignant tumor is a group of cancer cells that can grow into near tissues or invading the distant areas of the body. The disease occurs almost entirely in women, but men can get it, too. Survival rate, recurrence detection and disease-free survival rate (DFS) are the main patient's outcome and prognosis measures. Breast cancer outcomes are vary among different stages of the disease. There are five stages of breast cancer named as 0, 1, 2, 3, and 4. Prognosis helps doctors to save patients' lives …


Applying Spatial Intelligence For Decision Support Systems, Amira Idrees, Mohamed H. Ibrahim Jun 2020

Applying Spatial Intelligence For Decision Support Systems, Amira Idrees, Mohamed H. Ibrahim

Future Computing and Informatics Journal

Data mining is one of the vital techniques that could be applied in different fields such as medical, educational and industrial fields. Extracting patterns from spatial data is very useful to be used for discovering the trends in the data. However, analyzing spatial data is exhaustive due to its details as it is related to locations with a special representation such as longitude and latitude. This paper aims at proposing an approach for applying data mining techniques over spatial data to find trends in the data for decision support. Basic information considering spatial data is presented with presenting the proposed …


An Qos Based Multifaceted Matchmaking Framework For Web Services Discovery, G. Sambasivam Jun 2020

An Qos Based Multifaceted Matchmaking Framework For Web Services Discovery, G. Sambasivam

Future Computing and Informatics Journal

With the increasing demand, the web service has been the prominent technology for providing good solutions to the interoperability of different kind of systems. Web service supports mainly interoperability properties as it is the major usage of this promising technology. Although several technologies had been evolved before web service technology and this has more advantage of other technologies. This paper has concentrated mainly on the Multifaceted Matchmaking framework for Web Services Discovery using Quality of Services parameters. Traditionally web services have been discovered only with the functional properties like input, output, precondition and effect. Nowadays there is an increase in …


Medical Image Retrieval Using Self-Organising Map On Texture Features, Shashwati Mishra Jun 2020

Medical Image Retrieval Using Self-Organising Map On Texture Features, Shashwati Mishra

Future Computing and Informatics Journal

The process of capturing, transfer and sharing of information in the form of digital images have become easier due to the use of advanced technologies. Retrieval of desired images from these huge collections of image databases is one of the popular research areas and has its applications in various fields. An image set consists of images containing objects of different colours, shapes, orientations and sizes. The surface texture of the object in an image may also vary from another object in a different image. These factors make the process of image retrieval a difficult one. In this paper, Self-Organising Map …


Benign And Malignant Breast Cancer Segmentation Using Optimized Region Growing Technique, S. Punitha, A. Amuthan, K. Suresh Joseph Jun 2020

Benign And Malignant Breast Cancer Segmentation Using Optimized Region Growing Technique, S. Punitha, A. Amuthan, K. Suresh Joseph

Future Computing and Informatics Journal

Breast cancer is one of the dreadful diseases that affect women globally. The occurrences of breast masses in the breast region are the main cause for women to develop a breast cancer. Early detection of breast mass will increase the survival rate of women and hence developing an automated system for detection of the breast masses will support radiologists for accurate diagnosis. In the pre-processing step, the images are pre-processed using Gaussian filtering. An automated detection method of breast masses is proposed using an optimized region growing technique where the initial seed points and thresholds are optimally generated using a …


A Genetic Algorithm For Service Flow Management With Budget Constraint In Heterogeneous Computing, Ahmed A. Abdulhamed, Medhat A. Tawfeek, Arabi E. Keshk Jun 2020

A Genetic Algorithm For Service Flow Management With Budget Constraint In Heterogeneous Computing, Ahmed A. Abdulhamed, Medhat A. Tawfeek, Arabi E. Keshk

Future Computing and Informatics Journal

Heterogeneous computing supply various and scalable resources for many applications requirements. Its structure is based on interconnecting machines with several processing capacity spread over networks. The scientific bioinformatics and many other applications demand service flow processing in which services have dependencies execution. The environments of this computing are suitable for huge computational needs that contains diverse groups of services. Managing and mapping services of service flow to the suitable candidates who provides the service is classified as NP-complete problem. The managing such interdependent services on heterogeneous environments also takes the Quality of Service (QoS) requirements from users into account. This …


Time Series Forecasting Using Artificial Neural Networks Methodologies: A Systematic Review, Ahmed Tealab Jun 2020

Time Series Forecasting Using Artificial Neural Networks Methodologies: A Systematic Review, Ahmed Tealab

Future Computing and Informatics Journal

This paper studies the advances in time series forecasting models using artificial neural network methodologies in a systematic literature review. The systematic review has been done using a manual search of the published papers in the last 11 years (2006e2016) for the time series forecasting using new neural network models and the used methods are displayed. In the covered period in the study, the results obtained found 17 studies that meet all the requirements of the search criteria. Only three of the obtained proposals considered a process different to the autoregressive of a neural networks model. These results conclude that, …


Fuzzy Clustering Based Transition Region Extraction For Image Segmentation, Priyadarsan Parida Jun 2020

Fuzzy Clustering Based Transition Region Extraction For Image Segmentation, Priyadarsan Parida

Future Computing and Informatics Journal

Transition region based approaches are recent hybrid segmentation techniques well known for its simplicity and effectiveness. Here, the segmentation effectiveness depends on robust extraction of transition regions. So, we have proposed clustering approach based transition region extraction method for image segmentation. The proposed method initially uses the local variance of the input image to get the variance feature image. Fuzzy C-means clustering is applied to the variance feature image to separate the transitional features from the feature image. Further, Otsu thresholding is applied to the transitional feature image to extract the transition region. For extracting the exact edge image, morphological …


A Low Cost Autonomous Unmanned Ground Vehicle, Leckraj Nagowah Jun 2020

A Low Cost Autonomous Unmanned Ground Vehicle, Leckraj Nagowah

Future Computing and Informatics Journal

The aim of this project is to design and implement a low cost Autonomous Unmanned Ground Vehicle (AUGV), a vehicle that can be controlled remotely without an onboard human presence. The AUGV is also able to move autonomously while automatically detecting and avoiding obstacles. The vehicle also reads directions from QR codes, calculates the shortest path to its destination and autonomous move towards its final destination. A Raspberry Pi 3 has been used as the brain of the vehicle together with other components such as DC and Servo motors, Ultrasonic and Infrared sensors, webcam, batteries, power bank, motor controller and …


Distributed Processing Of Location Based Spatial Query Through Vantage Point Transformation, M. Priya, R. Kalpana Jun 2020

Distributed Processing Of Location Based Spatial Query Through Vantage Point Transformation, M. Priya, R. Kalpana

Future Computing and Informatics Journal

Location Based Services is the popular and geo sensitive service implicated over the smart phone by internet. Nowadays these system find its own enhancement, as they are using device‘s real time geographical information to provide information and entertainment. It allows the user to get the response to the query based on their current location there by location becomes the most basic context for the user. For example these services are used to check in restaurants, coffee shops to get the business reward from the nearest shop or to track the location of a person. The user of the smart phone …


A Proposed Hybrid Model For Adopting Cloud Computing In E-Government, Kh. E. Ali, Sh. A. Mazen, E. E. Hassanein Jun 2020

A Proposed Hybrid Model For Adopting Cloud Computing In E-Government, Kh. E. Ali, Sh. A. Mazen, E. E. Hassanein

Future Computing and Informatics Journal

Many developing countries are now experiencing revolution in e-government to deliver fluent and simple services for their citizens. However, governmental sectors face many challenges in using its e-governments’ services and its infrastructure, improving current services or developing new services; as data and applications increasingly inflating, IT budget costs, software licensing and support and difficulties in migration, integration and management for software and hardware. These challenges may lead to failure of e-governments’ projects. Therefore, there is a need for a solution to overcome these challenges. Cloud Computing plays a vital role to solve these problems. This paper demonstrates egovernment's obstacles and …


Non-Sequential Partitioning Approaches To Decision Tree Classifier, Shankru Guggari, Vijayakumar Kadappa, V. Umadevi Jun 2020

Non-Sequential Partitioning Approaches To Decision Tree Classifier, Shankru Guggari, Vijayakumar Kadappa, V. Umadevi

Future Computing and Informatics Journal

Decision tree is a well-known classifier which is widely used in real-world applications. It is easy to interpret, however it suffers from instability and lower classification performance for high-dimensionality datasets due to curse of dimensionality. Feature set partitioning is a novel concept to address the higher dimensionality problem by dividing the feature set into subsets (blocks). Many of the existing partitioning based decision tree approaches are sequential in nature, which lack logical relationships amongst the features. In this work, we propose novel non-sequential feature set partitioning methods by exploiting the ideas of Ferrer Diagram and Bell Triangle to create feature …