Skip to main content

A .Net Framework Approach for a Network Monitoring Tool

Research Abstract
Tools that monitor the performance of a PC are an essential part of today’s quality control of the computer systems. Such resources needed to be monitored are the Memory, the CPU, the Power Consumption and the Network. Network Monitoring tools aim to audit and keep track of certain parameters to ensure the network’s efficiency and to provide information that will assist in the network analysis. Network Monitoring tools are usually costly and not flexible enough to be adapted to the needs of the user. The problem of having a flexible, free and modern, in respect to the common industry knowledge, Network Monitoring tool is the goal of this paper. The solution aims to be a .Net framework open source product that is flexible to be adapted to the user's needs. It can be used by a single PC to monitor that PC’s network or can be installed on a gateway PC to monitor the entire network. The proposed .Net solution is comparable with commercial and open source solutions. The comparison will show that the proposed .Net framework open source solution contains extra features that do not exist in neither commercial nor open source solutions.
Research Authors
Islam A.T.F. Taj-Eddin


Research Department
Research Journal
International Journal of Computer Applications (IJCA), ISBN-(973-93-80870-79-8), Doi: 10.5120/8788-2769

Research Pages
1-14
Research Publisher
Published by Foundation of Computer Science (FCS), New York, USA
Research Rank
1
Research Vol
Volume 55, Number 10
Research Website
http://www.ijcaonline.org/
Research Year
2012

Using Handheld Mobile System for Learning Sign Language

Research Abstract
A handheld device system, such as cellular phone or a PDA, can be used in acquiring Sign Language (SL). The developed system uses graphic applications. The user uses the graphical system to view and to acquire knowledge about sign grammar and syntax based on the local vernacular particular to the country. This paper explores and exploits the possibility of the development of a mobile system to help the deaf and other people to communicate and learn using handheld devices. This knowledge can be utilized and manipulated by the user based on his needs.
Research Authors
M. Samir Abou El-Seoud, Islam A.T.F. Taj-Eddin, Ann Nosseir, Hosam F. El-Sofany and Nadine Abu Rumman

Research Department
Research Journal
Proceedings of 2012 International Conference on Interactive Collaborative Learning (ICL)
Research Pages
8 pages
Research Publisher
IEEE Xplore®
Research Rank
3
Research Vol
IEEE Catalog Number: CFP1223R-USB. ISBN:978-1-4673-2426-7
Research Website
http://www.icl-conference.org/icl2012/
Research Year
2012

Robust Digital Watermarking for Compressed 3D Models based on Polygonal Representation

Research Abstract
Multimedia has recently played an increasingly important role in various domains, including Web applications, movies, video game and medical visualization. The rapid growth of digital media data over the Internet, on the other hand, makes it easy for anyone to access, copy, edit and distribute digital contents such as electronic documents, images, sounds and videos. Motivated by this, much research work has been dedicated to develop methods for digital data copyright protection, tracing the ownership, and preventing illegal duplication or tampering. This paper introduces a methodology of robust digital watermarking based on a well-known spherical wavelet transformation, applied to 3D compressed model based on polygonal representation using a neural network. It will be demonstrated in this work that applying a watermarking algorithm on a compressed domain of a 3D object is more effective, efficient, and robust than when applied on a normal domain.
Research Authors
Samir Abou El-seoud, Nadine Abu Rumman, Islam A. T. F. Taj-eddin, Khalaf F. Khatatneh, Christain Gütl

Research Department
Research Journal
International Journal of Computer Applications (IJCA), ISBN-(973-93-80872-13-2), Doi:10.5120/9913-3909
Research Pages
1-14
Research Publisher
Published by Foundation of Computer Science (FCS), New York, USA
Research Rank
1
Research Vol
Volume 61, Number 4
Research Website
http://www.ijcaonline.org/
Research Year
2013

A Proposed Pedagogical Mobile Application for Learning Sign Language

Research Abstract
A handheld device system, such as cellular phone or a PDA, can be used in acquiring Sign Language (SL). The developed system uses graphic applications. The user uses the graphical system to view and to acquire knowledge about sign grammar and syntax based on the local vernacular particular to the country. This paper explores and exploits the possibility of the development of a mobile system to help the deaf and other people to communicate and learn using handheld devices. The pedagogical assessment of the prototype application that uses a recognitionbased interface e.g., images and videos, gave evidence that the mobile application is memorable and learnable. Additionally, considering primary and recency effects in the interface design will improve memorability and learnability.
Research Authors
M. Samir Abou El-Seoud, Ann Nosseir, Islam Taj-Eddin, Hosam El-Sofany, Nadine Abu Rumman,


Research Department
Research Journal
International Journal of Interactive Mobile Technologies (iJIM), ISSN-(1865-7923), Doi:10.3991/ijim.v7i1.2387
Research Pages
46-55
Research Publisher
International Association of Online Engineering
Research Rank
1
Research Vol
Volume 7, Number 1
Research Website
http://online-journals.org/index.php/i-jim/index
Research Year
2013

Towards A Promising Edge Classification Algorithm for the Graph Isomorphism Problem

Research Abstract
For over three decades the Graph Isomorphism (GI) problem has been extensively studied by many researchers in algorithms and complexity theory. To date, there is no formal proof to classify this problem to be in the class P or the class NP. In this paper, evidence had been proposed of the existing of polynomial time algorithm based on edge classification which can be used to prove that GI is rather in the class P.
Research Authors
Islam A.T.F.Taj-Eddin, Samir Abou El-Seoud, and Jihad M. AL-Ja’am,


Research Department
Research Journal
International Journal of Computer Applications (IJCA), ISBN-(973-93-80873-53-2), Doi: 10.5120/10986-6144
Research Pages
38-43
Research Publisher
Published by Foundation of Computer Science (FCS), New York, USA
Research Rank
1
Research Vol
Volume 65, Number 13
Research Website
http://www.ijcaonline.org/
Research Year
2013

Intelligent Word-Based Spam Filter Detection Using Multi-Neural Networks

Research Abstract
SPAM e-mails have a direct cost in terms of time, server storage space, network bandwidth consumptions and indirect costs to protect privacy and security breaches. Efforts have been done to create new filters techniques to block SPAM, however spammers have developed tactics to avoid these filters. A constant update to these techniques is required. This paper proposes a novel approach which is a characters-word-based technique. This approach uses a multi-neural networks classifier. Each neural network is trained based on a normalized weight obtained from the ASCII value of the word characters. Results of the experiment show high false positive and low true negative percentages.
Research Authors
Ann Nosseir, Khaled Nagati, and Islam Taj-Eddin,

Research Department
Research Journal
International Journal of Computer Science Issues (IJCSI),
Research Pages
17-21
Research Publisher
ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784
Research Rank
1
Research Vol
Volume 10, Issue 2, Number 1
Research Website
www.IJCSI.org
Research Year
2013

Enhancing Software Quality by an SPL Testing based Software Testing

Research Abstract
Software testing is a process of providing information that a software application or program meets the business and technical requirements that guided its design and development; and works as expected. Regardless of the environment (i.e. Structured or Object Oriented), software testing can also identifies important defects, flaws, or errors in the application code that must be fixed. Quality control involves the maintenance of quality in a product, particularly by comparing the performance of a product with a set of specifications. This paper introduces some basic knowledge regarding to software testing. The paper provides some new model that could improve quality of software testing as a mean to increase the overall quality of the product.
Research Authors
Hosam F El-sofany, Islam A Taj-eddin, Hassan El-hoimal, Tourki Al-tourki and Amjad Al-sadoon


Research Department
Research Journal
International Journal of Computer Applications (IJCA), ISBN: 973-93-80874-66-7, Doi: 10.5120/11844-7574
Research Pages
5-13
Research Publisher
Published by Foundation of Computer Science (FCS), New York, USA
Research Rank
1
Research Vol
Volume 69, Number 6
Research Website
http://www.ijcaonline.org/
Research Year
2013

Implementation of Web-Based Education in Egypt through Cloud Computing Technologies and Its Effect on Higher Education

Research Abstract
The information technology educational programs at most universities in Egypt face many obstacles that can be overcome using technology enhanced learning. An open source Moodle eLearning platform has been implemented at many public and private universities in Egypt, as an aid to deliver e-content and to provide the institution with various possibilities for implementing asynchronous e-learning web-based modules. In this paper the use of web-based education through cloud computing is presented. The evaluation showed that it has strongly contributed to the effectiveness of e- learning by improving the quality of students' comprehension.
Research Authors
M. Samir Abou El-Seoud, Hosam F. El-Sofany, Islam A.T.F. Taj-Eddin, Ann Nosseir and Mahmoud M. El-Khouly


Research Department
Research Journal
Higher Education Studies, ISSN 1925-4741, E-ISSN 1925-475X, Doi:10.5539/hes.v3n3p62.
Research Pages
62-76
Research Publisher
Published by Canadian Center of Science and Education
Research Rank
1
Research Vol
Volume 3, Number 3
Research Website
www.ccsenet.org/hes
Research Year
2013

On the Information Hiding Technique Using Least Significant Bits Steganography

Research Abstract
Steganography is the art and science of hiding data or the practice of concealing a message, image, or file within another message, image, or file. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. It is mainly used to maintain private data and/or secure confidential data from misused through unauthorized person. In contemporary terms, Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a simple Steganography method for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. The paper uses the (LSB) to embed a message into an image with 24-bit (i.e. 3 bytes) color pixels. The paper uses the (LSB) of every pixel’s bytes. The paper show that using three bits from every pixel is robust and the amount of change in the image will be minimal and indiscernible to the human eye. For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. A software tool that employ steganography to hide data inside of other files (encoding) as well as software to detect such hidden files (decoding) has been developed and presented.
Research Authors
Samir El-Seoud, Islam Taj-Eddin


Research Department
Research Journal
International Journal of Computer Science and Information Security (IJCSIS)
Research Pages
34-45
Research Publisher
International Journal of Computer Science and Information Security (IJCSIS), ISSN 1947-5500 © IJCSIS, USA
Research Rank
1
Research Vol
Volume 11, Number 11
Research Website
http://sites.google.com/site/ijcsis/
Research Year
2013

The Effect of E-learning on Learner's Motivation: A Case Study on Evaluating E-Learning and its Effect On Egyptian Higher Education

Research Abstract
Web-based learning tools provide integrated environments of various technologies to support diverse educators’ and learners’ needs via the Internet. An open source Moodle eLearning platform has been implemented at universities in Egypt as an aid to deliver e-content and to provide the institution with various possibilities for implementing asynchronous e-learning web-based modules. This paper shows that the use of interactive features of e-learning increases the motivation of undergraduate students for the learning process.
Research Authors
Samir El-Seoud, Naglaa Seddiek , Islam Taj-Eddin, Pauline Ghenghesh, and Mahmoud El-Khouly

Research Department
Research Journal
Proceedings of the Sixth International Conference on E-Learning in the Workplace 2013, New York, NY, USA
Research Pages
20-24
Research Publisher
The International Conference on E-Learning in the Workplace (ICELW)
Research Rank
3
Research Vol
ISBN: 978-0-9827670-3-0
Research Website
http://www.icelw.org/program/ICELW%202013%20Proceedings/start.html
Research Year
2013
Subscribe to