about.jpg

IMPLEMENTING BLOCKCHAIN TECHNOLOGY IN THE EGYPTIAN CONTEXT OPPORTUNITIES AND CHALLENGES

The purpose of this paper is to discuss the Blockchain technology adoption opportunities and challenges in Egypt. The Blockchain technology is evolving with diverse benefits worldwide. Each country has its own motives and barriers to adopt the Blockchain. Therefore, it is crucial to understand the benefits and the challenges of adopting the Blockchain technology from Egyptian prospective. The Egyptian supply chain management, real estate, banking and finance, and the governmental services are discussed in this research work as examples of potential sectors for the Blockchain adoption

Artificial Intelligence
Circuit Theory and Applications
Mechanical Design
Innovation, Entrepreneurship and Competitiveness

Energy Consumption Estimation of Mobile Networks' Base Stations Due to Traffic Change

Mobile operators are facing strong challenges regarding the environmental impact of their operations. The International Telecommunications Union (ITU) considered energy consumption as the prime source of Carbon dioxide (CO2) emissions for the whole Information and Communications Technology (ICT) sectors. ITU encouraged all ICT sectors to commit their efforts in order to control their energy consumption and consider renewable energy sources. By the year 2050, CO2 emissions should be fully neutralized as per the Paris climate agreement. The energy consumption of the Radio Access Network (RAN)

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications

A Cognitive Analytics Framework for Improving Sales Prediction Accuracy

accurate prediction of sales data is an important and challenging problem in the retail industry. However, due to the diversity of data types, it is difficult for traditional time series prediction models to generate good prediction results for different types of data. This research develops a cognitive analytic framework to help transform retailers from the reactive environment to automated continuously learning environment utilizing the power of AI technology in predicting future sales with high accuracy. It proposes a multi-stage prediction framework based on the integration of Statistical

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

A multiobjective nonlinear combinatorial model for improved planning of tour visits using a novel binary gaining-sharing knowledge- based optimization algorithm

This chapter proposes a novel binary version of recently developed Gaining-Sharing knowledge-based optimization algorithm (GSK) to solve binary optimization problems. GSK algorithm is based on the concept of how humans acquire and share knowledge during their life span. Binary version of GSK named novel binary Gaining-Sharing knowledge-based optimization algorithm (BGSK) depends on mainly two binary stages: binary junior gaining sharing stage and binary senior gaining sharing stage with knowledge factor 1. These two stages enable BGSK for exploring and exploitation of the search space

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Mechanical Design

Keyed Watermarks: A Fine-grained Tracking of Event-time in Apache Flink

Big Data Stream processing engines such as Apache Flink use windowing techniques to handle unbounded streams of events. Gathering all pertinent input within a window is crucial for event-time windowing since it affects how accurate results are. A significant part of this process is played by watermarks, which are unique timestamps that show the passage of events in time. However, the current watermark generation method in Apache Flink, which works at the level of the input stream, tends to favor faster sub-streams, resulting in dropped events from slower sub-streams. In our analysis, we found

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications

A Machine Learning-Based Intrusion Detection System for IoT Electric Vehicle Charging Stations (EVCSs)

The demand for electric vehicles (EVs) is growing rapidly. This requires an ecosystem that meets the user’s needs while preserving security. The rich data obtained from electric vehicle stations are powered by the Internet of Things (IoT) ecosystem. This is achieved through us of electric vehicle charging station management systems (EVCSMSs). However, the risks associated with cyber-attacks on IoT systems are also increasing at the same pace. To help in finding malicious traffic, intrusion detection systems (IDSs) play a vital role in traditional IT systems. This paper proposes a classifier

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Performance Comparison of AODV and DSDV in Vehicular Ad Hoc Networks

Vehicle Ad-Hoc Networks (VANETs) are a special type of Mobile Ad-Hoc Network (MANETs). In VANETs, a group of vehicles communicates with each other to transfer data without a need for a fixed infrastructure. In this paper, we compare the performance of two routing protocols: Ad-hoc on Demand Distance Vector protocol (AODV) and Destination-Sequenced Distance Vector protocol (DSDV) in VANETs. We measure the reliability of each protocol in the packet delivery. © 2022 IEEE.

Circuit Theory and Applications
Software and Communications

Ad-hoc Networks Performance based on Routing Protocol Type

There are many situations where there is a need for certain devices to be connected in a network independently without having a heavy infrastructure or human interventions to configure and connect them. This type of network is called ad-hoc networks. The key concern with such networks is how nodes communicate with each other and exchange information efficiently and securely. The issue with ad hoc networks is that traditional routing protocols are not suitable for such networks. In this paper, the performance of specific routing protocols for ad hoc networks will be evaluated. © 2022 IEEE.

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Intrusion Detection in VANETs and ACVs using Deep Learning

There are many novel techniques for intrusion detection in vehicular ad hoc networks and autonomous and connected vehicles. Detecting and reporting an attack is the main responsibility of an Intrusion detection system (IDS). Deep learning is used to make IDS smarter and more accurate. It implies other challenges on the other hand. This paper covers the proposed IDS based deep learning solutions and comparing effectiveness and efficiency of those solutions. © 2022 IEEE.

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Blackhole Attack effect on MANETs' Performance

Mobile Ad hoc networks (MANETs) facilitate the communication of devices with a limited communication range. A MANET can be described as a decentralized network with a constantly changing topology. This makes it vulnerable to different attacks. The black hole is one of the most dangerous attacks in MANETs. This paper discusses the Blackhole attack in a random mobility environment and analyses its impact on MANETs using several parameters for single and multiple connections. © 2022 IEEE.

Circuit Theory and Applications
Software and Communications