HELWAN UNIVERSITY

Displaying 1-24 of 24 results

  • White Papers // Oct 2014

    XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments

    XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data. However, XML document structure is considered a huge and bulky data that can be reduced to minimize bandwidth usage, transmission time, and maximize performance. This contributes to a more efficient and...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jun 2014

    Secure Mining of Classification in Horizontally Distributed Databases

    Data mining can extract interesting knowledge from large amount of data, but in distributed databases these large amounts of data is split among different parties. Privacy concerns may prevent parities from directly sharing the data which could lead to mutual benefit. This paper addresses a proposed secure mining protocol using...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2013

    Structuring Heterogeneous Big Data for Scalability and Accuracy

    Structured data has an inherently great automation value. It renders itself readily for software tools to help store, organize and search effectively. With the growing dependence of data, the users face many new problems. While software applications replace each other, and older software has rapidly diminishing value, data has the...

    Provided By HELWAN UNIVERSITY

  • White Papers // Apr 2013

    Biclustering Gene Expression Dataset Using Enhanced Barycenter Crossing Minimization

    There are two main categories of bi-clustering approaches graph-based bi-clustering, and non-graph based bi-clustering. In graph-based bi-clustering algorithm the input dataset is converted into bigraph such as bipartite graph, and apply some heuristic local searching techniques to minimize the number of crossings between edges in the Bigraph such as BaryCenter...

    Provided By HELWAN UNIVERSITY

  • White Papers // Mar 2013

    Ant Colony Accumulative Technique Applied in Wireless Sensor Network Grids Routing Problem

    This contribution presents a proposal of an applicable Routing Messages Protocol (RMP) which uses nodes location information and a multi-hop forwarding scheme to achieve long-range communication in Wireless Sensor Network Grids (WSNG). Ant COlony (ACO) accumulative technique has been applied to collect the hops list in the message way toward...

    Provided By HELWAN UNIVERSITY

  • White Papers // Feb 2013

    Enhanced Mobile Cloud Computing Platform

    Mobile Cloud Computing is a technology that influences integrated resources of varied clouds and network technologies toward limitless mobility, functionality and storage. It serves a mass of mobile devices anywhere, anytime through different channels, being either Ethernet or Internet regardless of diverse environments and platforms; it also means to provide...

    Provided By HELWAN UNIVERSITY

  • White Papers // Aug 2012

    A Comparative Study of Digital Watermarking Techniques in Frequency Domain

    Digital watermarking is hiding the information inside a digital media. Its widely used in copyright protection of digital images .This paper presents a comparative study of digital watermarking techniques in frequency domain and explores the role of Discrete cosine transform DCT, Discrete wavelet transform DWT and Contourlet transform CT in...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2012

    Hybrid-Based Compressed Domain Video Fingerprinting Technique

    Video fingerprinting is a newer research area. It is also called "Content-based video copy detection" or "Content-based video identification" in literature. The goal is to locate videos with segments substantially identical to segments of a query video while tolerating common artifacts in video processing. Its value as a tool to...

    Provided By HELWAN UNIVERSITY

  • White Papers // May 2012

    Parallel-Bit Stream for Securing Iris Recognition

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, the authors propose a fast method for securing revocable iris template using parallel-bit stream...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2011

    The Cloud Computing: The Future of BI in the Cloud

    What will Business intelligence be like in the future? Rechercher believe the Cloud is a big part of the future of business intelligence. Business Intelligence (BI) in the cloud can be like a big puzzle. Users can jump in and put together small pieces of the puzzle but until the...

    Provided By HELWAN UNIVERSITY

  • White Papers // Nov 2011

    An Ecosystem in e-Learning Using Cloud Computing as Platform and Web2.0

    Research community has believed that an e-learning ecosystem is the next generation e-learning but has faced challenges in optimizing resource allocations, dealing with dynamic demands on getting information and knowledge anywhere and anytime, handling rapid storage growth requirements, cost controlling and greater flexibility. Additionally, e-learning ecosystems need to improve its...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2011

    TRIUMF: Trust-Based Routing Protocol With Controlled Degree of Selfishness for Securing MANET Against Packet Dropping Attack

    In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more...

    Provided By HELWAN UNIVERSITY

  • White Papers // May 2011

    Hybrid Algorithm for Multiprocessor Task Scheduling

    Multiprocessors have become powerful computing means for running real-time applications and their high performance depends greatly on parallel and distributed network environment system. Consequently, several methods have been developed to optimally tackle the multiprocessor task scheduling problem which is called NPhard problem. To address this issue, this paper presents two...

    Provided By HELWAN UNIVERSITY

  • White Papers // May 2011

    TRIDNT: The Trust-Based Routing Protocol With Controlled Degree of Node Selfishness for MANET

    In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficient path. In this paper, the authors propose a Two node-disjoint...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2010

    A UML Approach to Build a Mobile Agent

    Mobile Agents are one of the most promising technologies of distributed computing. Mobile Agents have certain properties, such as autonomy, mobility and most of all; they fit well in the low-bandwidth network environments. This paper mainly focuses on the information retrieval in a distributed computing environment using a Mobile Agent....

    Provided By HELWAN UNIVERSITY

  • White Papers // Oct 2010

    A General Framework for Modeling Replicated Real-Time Database

    There are many issues that affect modeling and designing real-time databases. One of those issues is maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes. The need to improve the scalability is...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2009

    3D Face Recognition Using 2DPCA

    Robustness of face recognition systems are measured by its ability to overcome the problem of changing in facial expression and rotation of individuals' face images. This paper represents a face recognition system that overcomes the problem of changes in facial expressions in Three-Dimensional (3D) range images. A local variation detection...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2009

    Debt Sustainabiliy And Economic Growth In Egypt

    The persistence growth of Egypt's public domestic debt has raised concerns regarding its impact on economic growth and fears are being express about the debt sustainability. Utilizing data for the period 1981-2006, the results obtained from cointegration model reveal that the public domestic debt in Egypt has a robust negative...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2009

    Resisting Traitors in Linkable Democratic Group Signatures

    Linkable Democratic Group Signatures (LDGS) allow every member of a group to trace the identity of any other member who issued a signature while non-members (with the help of unique pseudonyms) are only able to link the signatures issued by the same signer without being able to trace the signer's...

    Provided By HELWAN UNIVERSITY

  • White Papers // Mar 2009

    3d Automatic Building Footprints Generation

    Virtual building modeling became an increasingly urgent need for computer graphics, simulation, games, films and virtual reality. However, this is an exhaustive task and requires much more time and effort. There are many researches, which state this problem, but most of them concentrate on grammar-based generation. Grammar-based generation researches require...

    Provided By HELWAN UNIVERSITY

  • White Papers // Mar 2009

    Receiver-Deniable Public-Key Encryption

    Incoercible (or deniable) encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive adversary. Such an adversary approaches the coerced user after transmission forcing him to reveal all his random inputs used during encryption or decryption. Since traditional...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jan 2009

    Efficient Dealer-Less Threshold Sharing of Standard RSA

    In an efficient two-party, two-prime RSA function sharing protocol was proposed. The protocol proves efficiency over previously proposed protocols. When the sharing of standard RSA is considered, the protocol is faster than ever. In this paper, under the assumption that the adversary has eavesdropping and halting capabilities, the authors propose...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jan 2009

    A Method for Obtaining Deniable Public-Key Encryption

    Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive adversary. Such an adversary approaches the coerced user after transmission forcing him to reveal all his random inputs used during encryption or decryption. Since traditional encryption schemes...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2008

    Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing

    The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the help of a trusted dealer. The incorporated parties must agree on a suitable RSA modulus with no information...

    Provided By HELWAN UNIVERSITY

  • White Papers // Aug 2012

    A Comparative Study of Digital Watermarking Techniques in Frequency Domain

    Digital watermarking is hiding the information inside a digital media. Its widely used in copyright protection of digital images .This paper presents a comparative study of digital watermarking techniques in frequency domain and explores the role of Discrete cosine transform DCT, Discrete wavelet transform DWT and Contourlet transform CT in...

    Provided By HELWAN UNIVERSITY

  • White Papers // Mar 2013

    Ant Colony Accumulative Technique Applied in Wireless Sensor Network Grids Routing Problem

    This contribution presents a proposal of an applicable Routing Messages Protocol (RMP) which uses nodes location information and a multi-hop forwarding scheme to achieve long-range communication in Wireless Sensor Network Grids (WSNG). Ant COlony (ACO) accumulative technique has been applied to collect the hops list in the message way toward...

    Provided By HELWAN UNIVERSITY

  • White Papers // Feb 2013

    Enhanced Mobile Cloud Computing Platform

    Mobile Cloud Computing is a technology that influences integrated resources of varied clouds and network technologies toward limitless mobility, functionality and storage. It serves a mass of mobile devices anywhere, anytime through different channels, being either Ethernet or Internet regardless of diverse environments and platforms; it also means to provide...

    Provided By HELWAN UNIVERSITY

  • White Papers // May 2012

    Parallel-Bit Stream for Securing Iris Recognition

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, the authors propose a fast method for securing revocable iris template using parallel-bit stream...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2011

    The Cloud Computing: The Future of BI in the Cloud

    What will Business intelligence be like in the future? Rechercher believe the Cloud is a big part of the future of business intelligence. Business Intelligence (BI) in the cloud can be like a big puzzle. Users can jump in and put together small pieces of the puzzle but until the...

    Provided By HELWAN UNIVERSITY

  • White Papers // Nov 2011

    An Ecosystem in e-Learning Using Cloud Computing as Platform and Web2.0

    Research community has believed that an e-learning ecosystem is the next generation e-learning but has faced challenges in optimizing resource allocations, dealing with dynamic demands on getting information and knowledge anywhere and anytime, handling rapid storage growth requirements, cost controlling and greater flexibility. Additionally, e-learning ecosystems need to improve its...

    Provided By HELWAN UNIVERSITY

  • White Papers // Mar 2009

    3d Automatic Building Footprints Generation

    Virtual building modeling became an increasingly urgent need for computer graphics, simulation, games, films and virtual reality. However, this is an exhaustive task and requires much more time and effort. There are many researches, which state this problem, but most of them concentrate on grammar-based generation. Grammar-based generation researches require...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2010

    A UML Approach to Build a Mobile Agent

    Mobile Agents are one of the most promising technologies of distributed computing. Mobile Agents have certain properties, such as autonomy, mobility and most of all; they fit well in the low-bandwidth network environments. This paper mainly focuses on the information retrieval in a distributed computing environment using a Mobile Agent....

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2009

    3D Face Recognition Using 2DPCA

    Robustness of face recognition systems are measured by its ability to overcome the problem of changing in facial expression and rotation of individuals' face images. This paper represents a face recognition system that overcomes the problem of changes in facial expressions in Three-Dimensional (3D) range images. A local variation detection...

    Provided By HELWAN UNIVERSITY

  • White Papers // May 2011

    Hybrid Algorithm for Multiprocessor Task Scheduling

    Multiprocessors have become powerful computing means for running real-time applications and their high performance depends greatly on parallel and distributed network environment system. Consequently, several methods have been developed to optimally tackle the multiprocessor task scheduling problem which is called NPhard problem. To address this issue, this paper presents two...

    Provided By HELWAN UNIVERSITY

  • White Papers // May 2011

    TRIDNT: The Trust-Based Routing Protocol With Controlled Degree of Node Selfishness for MANET

    In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficient path. In this paper, the authors propose a Two node-disjoint...

    Provided By HELWAN UNIVERSITY

  • White Papers // Oct 2010

    A General Framework for Modeling Replicated Real-Time Database

    There are many issues that affect modeling and designing real-time databases. One of those issues is maintaining consistency between the actual state of the real-time object of the external environment and its images as reflected by all its replicas distributed over multiple nodes. The need to improve the scalability is...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2009

    Debt Sustainabiliy And Economic Growth In Egypt

    The persistence growth of Egypt's public domestic debt has raised concerns regarding its impact on economic growth and fears are being express about the debt sustainability. Utilizing data for the period 1981-2006, the results obtained from cointegration model reveal that the public domestic debt in Egypt has a robust negative...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2011

    TRIUMF: Trust-Based Routing Protocol With Controlled Degree of Selfishness for Securing MANET Against Packet Dropping Attack

    In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2012

    Hybrid-Based Compressed Domain Video Fingerprinting Technique

    Video fingerprinting is a newer research area. It is also called "Content-based video copy detection" or "Content-based video identification" in literature. The goal is to locate videos with segments substantially identical to segments of a query video while tolerating common artifacts in video processing. Its value as a tool to...

    Provided By HELWAN UNIVERSITY

  • White Papers // Dec 2013

    Structuring Heterogeneous Big Data for Scalability and Accuracy

    Structured data has an inherently great automation value. It renders itself readily for software tools to help store, organize and search effectively. With the growing dependence of data, the users face many new problems. While software applications replace each other, and older software has rapidly diminishing value, data has the...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2008

    Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing

    The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the help of a trusted dealer. The incorporated parties must agree on a suitable RSA modulus with no information...

    Provided By HELWAN UNIVERSITY

  • White Papers // Apr 2013

    Biclustering Gene Expression Dataset Using Enhanced Barycenter Crossing Minimization

    There are two main categories of bi-clustering approaches graph-based bi-clustering, and non-graph based bi-clustering. In graph-based bi-clustering algorithm the input dataset is converted into bigraph such as bipartite graph, and apply some heuristic local searching techniques to minimize the number of crossings between edges in the Bigraph such as BaryCenter...

    Provided By HELWAN UNIVERSITY

  • White Papers // Mar 2009

    Receiver-Deniable Public-Key Encryption

    Incoercible (or deniable) encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive adversary. Such an adversary approaches the coerced user after transmission forcing him to reveal all his random inputs used during encryption or decryption. Since traditional...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jan 2009

    Efficient Dealer-Less Threshold Sharing of Standard RSA

    In an efficient two-party, two-prime RSA function sharing protocol was proposed. The protocol proves efficiency over previously proposed protocols. When the sharing of standard RSA is considered, the protocol is faster than ever. In this paper, under the assumption that the adversary has eavesdropping and halting capabilities, the authors propose...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jan 2009

    A Method for Obtaining Deniable Public-Key Encryption

    Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive adversary. Such an adversary approaches the coerced user after transmission forcing him to reveal all his random inputs used during encryption or decryption. Since traditional encryption schemes...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jul 2009

    Resisting Traitors in Linkable Democratic Group Signatures

    Linkable Democratic Group Signatures (LDGS) allow every member of a group to trace the identity of any other member who issued a signature while non-members (with the help of unique pseudonyms) are only able to link the signatures issued by the same signer without being able to trace the signer's...

    Provided By HELWAN UNIVERSITY

  • White Papers // Jun 2014

    Secure Mining of Classification in Horizontally Distributed Databases

    Data mining can extract interesting knowledge from large amount of data, but in distributed databases these large amounts of data is split among different parties. Privacy concerns may prevent parities from directly sharing the data which could lead to mutual benefit. This paper addresses a proposed secure mining protocol using...

    Provided By HELWAN UNIVERSITY

  • White Papers // Oct 2014

    XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments

    XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data. However, XML document structure is considered a huge and bulky data that can be reduced to minimize bandwidth usage, transmission time, and maximize performance. This contributes to a more efficient and...

    Provided By HELWAN UNIVERSITY