Accepted Papers

    Aakash Ahmad, Ahmed B. Altamimi, Abdulrahman Alreshidi 1College of Computer Science and Engineering, University of Ha’il, Ha’il, Saudi Arabia

    Mobile computing empowers its users to exploit portable computation and context-aware communication, however; a mobile device lacks energy and performance to execute computation and memory intensive tasks. On the contrary, cloud computing exploits the ‘pay-per-use’ software and hardware services to provide virtually unlimited processing and storage resources. The unification of mobile and cloud computing as Mobile Cloud Computing (MCC) enables mobility and context awareness with computation and storage services to provide systems that are portable, yet resource sufficient. In an architectural context for MCC systems that require context-awareness, mobility and scalability, etc., there is a need to capitalise on reusable solutions – utilising patterns and best practices – to architect and develop mobile cloud software. This research aims to build and exploit a catalogue of patterns that support reusable design knowledge for architecture-based development of the MCC systems. We have discovered some patterns as generic and reusable solutions and demonstrate their usage in the context of mobile cloud systems. The proposed research aims to establish the catalogue as patterns repository – facilitating a continuous discovery and documentation of new patterns overtime that support reusable knowledge and practices to develop MCC systems.

    Research Laboratory on Computer Science’s Complex Systems ReLaCS2, Oum El Bouaghi University, Oum El Bouaghi City 04000, Algeria

    This paper presents a new short survey on System On Chip (SOC) architectures and Codesign methodologies with a focus on the possible application of Artificial Intelligence (AI) methods to improve conventional SOC Codesign methodologies. Comparatively to back-end activities which are more automated, we think that requirement engineering activities which are more interactive and experience human-guided are a fertile area where AI methods can be applied efficiently to assist SOC analysts to comprehend and collect changing customers requirements, establish project scheduling and performance/risks estimations and making early multi-criterion decisions with regard to the most appropriate available methodologies and tools matching well the project objectives and constraints.

  • Cryptography Protocol: A Novel Multilingual Adaptive Encryption Technique with Phonetic Based Ciphering
    Ahmed Mokhtar A. Mansour 1, Mona A. M. Fouad2,1CTO, Nile Innovations, Cairo,Egypt

    This paper proposes a novel hybrid encryption algorithm. The encryption is based on two major aspects. The first is the phonetic difference between languages and their mapping into Human Machine interface tools such as the computer keyboard. The second aspect is the embedded ciphering process as a mean of private key exchange (PKE). Such a key will be used to determine all the ciphering parameters such as the ciphering indicator, the ciphering key, the ciphering array, the ciphering operators, etc. The presented encryption protocol is an end-to-end process and the choices of languages and machine interface is completely user dependant. The creation of ciphering parameters such as indicator, key, array and operation is also user defined. This work explores several examples for each choice using the Arabic language as a model for the phonetic intermediate language, demonstrating the knowhow mechanism.