ºÝºÝߣshows by User: AmiraBibo / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: AmiraBibo / Thu, 19 Apr 2018 14:56:04 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: AmiraBibo Steganography methods using network protocols /slideshow/steganography-methods-using-network-protocols/94350814 steganographymethodsusingnetworkprotocols-180419145604
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field. The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.]]>

The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field. The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.]]>
Thu, 19 Apr 2018 14:56:04 GMT /slideshow/steganography-methods-using-network-protocols/94350814 AmiraBibo@slideshare.net(AmiraBibo) Steganography methods using network protocols AmiraBibo The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field. The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/steganographymethodsusingnetworkprotocols-180419145604-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field. The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.
Steganography methods using network protocols from Dr Amira Bibo
]]>
165 2 https://cdn.slidesharecdn.com/ss_thumbnails/steganographymethodsusingnetworkprotocols-180419145604-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An investigation for steganography using different color system /slideshow/an-investigation-for-steganography-using-different-color-system/94350296 aninvestigationforsteganographyusingdifferentcolorsystem-180419145133
ABSTRACT Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet. In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image. The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results.]]>

ABSTRACT Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet. In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image. The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results.]]>
Thu, 19 Apr 2018 14:51:32 GMT /slideshow/an-investigation-for-steganography-using-different-color-system/94350296 AmiraBibo@slideshare.net(AmiraBibo) An investigation for steganography using different color system AmiraBibo ABSTRACT Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet. In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image. The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aninvestigationforsteganographyusingdifferentcolorsystem-180419145133-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ABSTRACT Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet. In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image. The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results.
An investigation for steganography using different color system from Dr Amira Bibo
]]>
112 2 https://cdn.slidesharecdn.com/ss_thumbnails/aninvestigationforsteganographyusingdifferentcolorsystem-180419145133-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android security /slideshow/android-security-94350213/94350213 androidsecurity-180419145049
ABSTRACT Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.]]>

ABSTRACT Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.]]>
Thu, 19 Apr 2018 14:50:49 GMT /slideshow/android-security-94350213/94350213 AmiraBibo@slideshare.net(AmiraBibo) Android security AmiraBibo ABSTRACT Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidsecurity-180419145049-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ABSTRACT Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.
Android security from Dr Amira Bibo
]]>
89 2 https://cdn.slidesharecdn.com/ss_thumbnails/androidsecurity-180419145049-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Supervised classification and improved filtering method for shoreline detection. /slideshow/supervised-classification-and-improved-filtering-method-for-shoreline-detection/94348662 supervisedclassificationandimprovedfilteringmethodforshorelinedetection-180419143635
ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection andthe Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images.]]>

ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection andthe Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images.]]>
Thu, 19 Apr 2018 14:36:35 GMT /slideshow/supervised-classification-and-improved-filtering-method-for-shoreline-detection/94348662 AmiraBibo@slideshare.net(AmiraBibo) Supervised classification and improved filtering method for shoreline detection. AmiraBibo ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection andthe Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/supervisedclassificationandimprovedfilteringmethodforshorelinedetection-180419143635-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection andthe Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images.
Supervised classification and improved filtering method for shoreline detection. from Dr Amira Bibo
]]>
56 2 https://cdn.slidesharecdn.com/ss_thumbnails/supervisedclassificationandimprovedfilteringmethodforshorelinedetection-180419143635-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile cloud computing /slideshow/mobile-cloud-computing-94348654/94348654 mobilecloudcomputing-180419143630
ABSTRACT In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.]]>

ABSTRACT In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.]]>
Thu, 19 Apr 2018 14:36:30 GMT /slideshow/mobile-cloud-computing-94348654/94348654 AmiraBibo@slideshare.net(AmiraBibo) Mobile cloud computing AmiraBibo ABSTRACT In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobilecloudcomputing-180419143630-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ABSTRACT In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
Mobile cloud computing from Dr Amira Bibo
]]>
85 2 https://cdn.slidesharecdn.com/ss_thumbnails/mobilecloudcomputing-180419143630-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm /AmiraBibo/eoedrtsa-endtoend-distributed-realtime-system-scheduling-algorithm eoe-drtsaend-to-enddistributedreal-timesystemschedulingalgorithm-180419143628
In this paper, scheduling dependent threads in distributed real-time system where considered. We present a distributed real-time scheduling algorithm called (EOE-DRTSA (end-to-end distributed real time system Scheduling algorithm)). Now a day completed realtime systems are distributed. One of least developed areas of realtime scheduling is distributed scheduling where in Distributed systems action and information timeliness is often end-to-end. Designers and users of distributed systems often need to dependably reason about end-to-end timeliness. Our scheduling model includes threads and their time constraints depend on developed DTUF value and maintaining end-to-end prosperities of distributed real-time system.]]>

In this paper, scheduling dependent threads in distributed real-time system where considered. We present a distributed real-time scheduling algorithm called (EOE-DRTSA (end-to-end distributed real time system Scheduling algorithm)). Now a day completed realtime systems are distributed. One of least developed areas of realtime scheduling is distributed scheduling where in Distributed systems action and information timeliness is often end-to-end. Designers and users of distributed systems often need to dependably reason about end-to-end timeliness. Our scheduling model includes threads and their time constraints depend on developed DTUF value and maintaining end-to-end prosperities of distributed real-time system.]]>
Thu, 19 Apr 2018 14:36:28 GMT /AmiraBibo/eoedrtsa-endtoend-distributed-realtime-system-scheduling-algorithm AmiraBibo@slideshare.net(AmiraBibo) EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm AmiraBibo In this paper, scheduling dependent threads in distributed real-time system where considered. We present a distributed real-time scheduling algorithm called (EOE-DRTSA (end-to-end distributed real time system Scheduling algorithm)). Now a day completed realtime systems are distributed. One of least developed areas of realtime scheduling is distributed scheduling where in Distributed systems action and information timeliness is often end-to-end. Designers and users of distributed systems often need to dependably reason about end-to-end timeliness. Our scheduling model includes threads and their time constraints depend on developed DTUF value and maintaining end-to-end prosperities of distributed real-time system. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eoe-drtsaend-to-enddistributedreal-timesystemschedulingalgorithm-180419143628-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this paper, scheduling dependent threads in distributed real-time system where considered. We present a distributed real-time scheduling algorithm called (EOE-DRTSA (end-to-end distributed real time system Scheduling algorithm)). Now a day completed realtime systems are distributed. One of least developed areas of realtime scheduling is distributed scheduling where in Distributed systems action and information timeliness is often end-to-end. Designers and users of distributed systems often need to dependably reason about end-to-end timeliness. Our scheduling model includes threads and their time constraints depend on developed DTUF value and maintaining end-to-end prosperities of distributed real-time system.
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm from Dr Amira Bibo
]]>
51 3 https://cdn.slidesharecdn.com/ss_thumbnails/eoe-drtsaend-to-enddistributedreal-timesystemschedulingalgorithm-180419143628-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Developing fault tolerance integrity protocol for distributed real time systems /slideshow/developing-fault-tolerance-integrity-protocol-for-distributed-real-time-systems/94348634 developingfaulttoleranceintegrityprotocolfordistributedrealtimesystems-180419143621
In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the system to meet the tasks deadline and to detect their failure and recover them. In this paper, we considered the problem of fault tolerance and developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in distributed real time systems.]]>

In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the system to meet the tasks deadline and to detect their failure and recover them. In this paper, we considered the problem of fault tolerance and developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in distributed real time systems.]]>
Thu, 19 Apr 2018 14:36:21 GMT /slideshow/developing-fault-tolerance-integrity-protocol-for-distributed-real-time-systems/94348634 AmiraBibo@slideshare.net(AmiraBibo) Developing fault tolerance integrity protocol for distributed real time systems AmiraBibo In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the system to meet the tasks deadline and to detect their failure and recover them. In this paper, we considered the problem of fault tolerance and developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in distributed real time systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/developingfaulttoleranceintegrityprotocolfordistributedrealtimesystems-180419143621-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the system to meet the tasks deadline and to detect their failure and recover them. In this paper, we considered the problem of fault tolerance and developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in distributed real time systems.
Developing fault tolerance integrity protocol for distributed real time systems from Dr Amira Bibo
]]>
56 2 https://cdn.slidesharecdn.com/ss_thumbnails/developingfaulttoleranceintegrityprotocolfordistributedrealtimesystems-180419143621-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Constructing sierpinski gasket using gp us arrays /slideshow/constructing-sierpinski-gasket-using-gp-us-arrays/94348615 constructingsierpinskigasketusinggpusarrays-180419143615
A fractal is a mathematical set that typically displays self-similar patterns, which means it is "the same from near as from far". Fractals may be exactly the same at every scale, they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes the idea of a detailed pattern repeating itself. The algorithms to constructing different fractal shapes in many cases typically involve large amounts of floating point computation, to which modern GPUs are well suited. In this paper we will construct Sierpinski Gasket using GPUs arrays.]]>

A fractal is a mathematical set that typically displays self-similar patterns, which means it is "the same from near as from far". Fractals may be exactly the same at every scale, they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes the idea of a detailed pattern repeating itself. The algorithms to constructing different fractal shapes in many cases typically involve large amounts of floating point computation, to which modern GPUs are well suited. In this paper we will construct Sierpinski Gasket using GPUs arrays.]]>
Thu, 19 Apr 2018 14:36:15 GMT /slideshow/constructing-sierpinski-gasket-using-gp-us-arrays/94348615 AmiraBibo@slideshare.net(AmiraBibo) Constructing sierpinski gasket using gp us arrays AmiraBibo A fractal is a mathematical set that typically displays self-similar patterns, which means it is "the same from near as from far". Fractals may be exactly the same at every scale, they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes the idea of a detailed pattern repeating itself. The algorithms to constructing different fractal shapes in many cases typically involve large amounts of floating point computation, to which modern GPUs are well suited. In this paper we will construct Sierpinski Gasket using GPUs arrays. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/constructingsierpinskigasketusinggpusarrays-180419143615-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A fractal is a mathematical set that typically displays self-similar patterns, which means it is &quot;the same from near as from far&quot;. Fractals may be exactly the same at every scale, they may be nearly the same at different scales. The concept of fractal extends beyond trivial self-similarity and includes the idea of a detailed pattern repeating itself. The algorithms to constructing different fractal shapes in many cases typically involve large amounts of floating point computation, to which modern GPUs are well suited. In this paper we will construct Sierpinski Gasket using GPUs arrays.
Constructing sierpinski gasket using gp us arrays from Dr Amira Bibo
]]>
164 2 https://cdn.slidesharecdn.com/ss_thumbnails/constructingsierpinskigasketusinggpusarrays-180419143615-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android security /slideshow/android-security-94348607/94348607 androidsecurity-180419143606
ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then, the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images.]]>

ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then, the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images.]]>
Thu, 19 Apr 2018 14:36:06 GMT /slideshow/android-security-94348607/94348607 AmiraBibo@slideshare.net(AmiraBibo) Android security AmiraBibo ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then, the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidsecurity-180419143606-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ABSTRACT Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently, many researchers have directed attention to methods of predicting shoreline changes by the use of multispectral images. However, the images being captured tend to have several problems due to the weather. Therefore, identification of multi class features which includes vegetation and shoreline using multispectral satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then, the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5 images.
Android security from Dr Amira Bibo
]]>
50 2 https://cdn.slidesharecdn.com/ss_thumbnails/androidsecurity-180419143606-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-AmiraBibo-48x48.jpg?cb=1648929347 https://cdn.slidesharecdn.com/ss_thumbnails/steganographymethodsusingnetworkprotocols-180419145604-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/steganography-methods-using-network-protocols/94350814 Steganography methods ... https://cdn.slidesharecdn.com/ss_thumbnails/aninvestigationforsteganographyusingdifferentcolorsystem-180419145133-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/an-investigation-for-steganography-using-different-color-system/94350296 An investigation for s... https://cdn.slidesharecdn.com/ss_thumbnails/androidsecurity-180419145049-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/android-security-94350213/94350213 Android security