The Internet of Things (IoT) is an Internet revolution that is increasingly used in business, industry, medicine, the economy and other modern information society. IoT, particularly transport, industrial robots and automation systems are supported by artificial intelligence in a wide range of daily implementations with dominant industrial applications. IoT is an interconnected network of physical objects, which enables them to gather and share information, using software, sensor units and network connectivity. In industries; IoT brought about a new revolution in industries. In the field of IoT
Pseudo-random number generator (PRNG) are a key component in the design of modern cryptographic mechanisms and are regarded as a backbone element of many modern cryptographic applications. However and in spite of their robustness, quantum computers could crack down PNGR-based systems. Quantum walks, a universal model of quantum computation, have nonlinear properties that make them a robust candidate to produce PRNG. In this paper, we utilize controlled alternate quantum walk (CAQW) to create PRNG. Moreover, we use the presented PRNG mechanism as a component of a new quantum color image
Vehicular Ad Hoc Networks (VANETs) are considered as a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, they are subject to an attack that has a severe impact on their security. This attack is called the Sybil attack, and it is considered as one of the most serious attacks to VANETs, and a threat to lives of drivers and passengers. In this paper, we propose a detection scheme for the Sybil attack. The idea is based on public key cryptography and aims to ensure privacy preservation, confidentiality, and non
Magnifying micro changes in motion and brightness of videos that are unnoticeable by the human visual system have recently been an interesting area to explore. In this paper, we explore this technique in 3D facial video identification, we utilize this technique to identify 3D objects from 2D images. We present a Complex Wavelet Transform CWT, 2D-Dual CWT based technique, to calculate any changes between subsequent video frames of CWT sub-bands at different spatial locations. In this technique, a gradient based method is proposed to determine the orientation of each CWT sub band in addition to
A distributed data collection algorithm to accurately store and forward information obtained by wireless sensor networks is proposed. The proposed algorithm does not depend on the sensor network topology, routing tables, or geographic locations of sensor nodes, but rather makes use of uniformly distributed storage nodes. Analytical and simulation results for this algorithm show that, with high probability, the data disseminated by the sensor nodes can be precisely collected by querying any small set of storage nodes.
In this paper, we describe a method for Scale-Adaptive visual tracking using compressive sensing. Instead of using scale-invariant-features to estimate the object size every few frames, we use the compressed features at different scale then perform a second stage of classification to detect the best-fit scale. We describe the proposed mechanism of how we implement the Bayesian Classifier used in the algorithm and how to tune the classifier to address the scaling problem and the method of selecting the positive training samples and negative training samples of different scales. The obtained
Egyptians are at a crossroad between Africa and Eurasia, providing useful genomic resources for analyzing both genetic and environmental factors for future personalized medicine. Two personal Egyptian whole genomes have been published previously by us and here nine female whole genome sequences with clinical information have been added to expand the genomic resource of Egyptian personal genomes. Here we report the analysis of whole genomes of nine Egyptian females from different regions using Illumina short-read sequencers. At 30x sequencing coverage, we identified 12 SNPs that were shared in
The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. COVID-19 is known to be a highly infectious virus, and infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, a non-negligible fraction of the population can, at any given time, be a hidden source of transmissions. In response, many governments have shown great interest in smartphone contact tracing apps that help automate the difficult task of tracing all recent contacts of newly identified infected individuals. However, tracing
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important
Malignant Tumors are developed over several years due to unknown biological factors. These biological factors induce changes in the body and consequently, they lead to Malignant Tumors. Some habits and behaviors initiate these biological factors. In effect, the immune system cannot recognize a Malignant Tumor as foreign tissue. In order to discover a fascinating pattern of these habits, behaviors, and diseases and to make effective decisions, different machine learning techniques should be used. This research attempts to find the association between normal proteins (environmental factors) and