©2012-17 International Journal of Information Technology and Electrical Engineering `
ITEE, 6 (2) pp. 40-45, APR 2017
40
ITEE Journal Information Technology & Electrical Engineering
ISSN: – 2306-708X
Volume 6, Issue 2 April 2017
Predicting Critical Cloud Computing Security Issues using Artificial Neural
Network (ANNs) Algorithms in Banking Organizations
Abdelrafe Elzamly1, Burairah Hussin 2, Samy S. Abu Naser3, Tadahiro Shibutani4, and Mohamed Doheir5
1Department of Computer Science, Al-Aqsa University, Gaza, Palestine 2 ,5 Information & Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia
3Department Information Technology, Al-Azhar University, Gaza, Palestine 4Institute of Advanced Sciences, Yokohama National University, Yokohama, Japan
E-mail: 3abunaser@alazhar.edu.ps
ABSTRACT The aim of this study is to predict critical cloud computing security issues by using Artificial Neural Network (ANNs) algorithms.
However, we proposed the Levenberg–Marquardt based Back Propagation (LMBP) Algorithms to predict the performance for
cloud security level. Also LMBP algorithms can be used to estimate the performance of accuracy in predicting cloud security
level. ANNs are more efficiently used for improving performance and learning neural membership functions. Furthermore, we
used the cloud Delphi technique for data gathering and analysis it in this study. In this study, the samples of 40 panelists were
selected from inside and outside Malaysian banking organizations based on their experienced in banking cloud computing.
However, we have indicated that the LMBP is nonlinear optimization models which used to measure accuracy of the prediction
model, the Mean Square Error (MSE) are measured to determine the performance. The performance is goodness, if the MSE is
small as shown in Table 1. This work has been conducted on groups of cloud banking developers and IT managers. As future
work, we intend to combine another optimal technique with ANNs algorithms to predict and mitigate critical security cloud issues.
Though, positive prediction of critical cloud security issues is going to surge the probability of cloud banking success rate.
Keywords: Cloud banking organization, Cloud Computing, Cloud Security Issues, , Artificial Neural Network, Levenberg Marquardt Algorithm,
Back Propagation Algorithm,. 1. NTRODUCTION
Although much research and progress in the area of
cloud computing project, a lot of cloud computing projects
have a very high failure rate particularly when it is related to
the banking area. However, several serious cloud security
issues like data protection and integrity, quality of
services(QoS), Portability and Interoperability, and mobility
need to be controlled and mitigated before cloud computing
able to apply adoptive widely [1]. In addition, cloud
computing has several advantages but cloud computing in
banking organizations is suffering from a lot of cloud
security issues. The aim of cloud risk management is
identification and evaluation of cloud security issues at an
early stage to predict the cloud computing security level [2].
Today, cloud computing risk management became a mutual
practice amongst leading banking organization success. In
the increasing effort to improve development processes and
security; new studies have led to cloud computing risk area.
Risk management aids software project manager and team
to do improved decisions to mitigate cloud-computing risks.
The objective of this study is predicting performance for
cloud computing security issues using Levenberg–
Marquardt based Back Propagation (LMBP) algorithms.
2. LITERATURE REVIEW
Cloud computing risk management consists of
computing processes, methods and techniques that are
useful to mitigate cloud computing risk failure. Security
risk management is increasingly becoming significant
in a diversity of areas linked to information technology
(IT), for example: telecommunications, banking
information systems, cloud computing[3]. Moreover,
the cloud banking model is a resource management
modeling founded on economic philosophies. Its
function like commercial banks in loan and deposit
business [4]. Cloud security is a general subject and any
grouping of policies, controls, and technologies to
safeguard data, services and infrastructure from
conceivable attacks. Additionally, current researches
focused on providing security technologies, instead of
business features such as services stability, availability
and continuity [5]. This study is going to predict the
critical cloud issues in Malaysian banking
organizations. Actually, they presented the conceptual
framework for cloud security banking that involved
components for example security, legal, privacy,
compliance and regulatory issues of banking [6]. As
stated by previous studies we split the framework
modeling cloud computing to five phases as mobility
and banking application, Cloud Deployment Models
(CDM), cloud risk management models (CRMM),
Cloud Service Models (CSM), and cloud security model
(CSM) as follows: Firstly, mobility related to the
possibility of moving and taking place in diverse
locations and through multiple times using any kind of
portable devices like smart phones, Personal Digital
Assistants (PDAs) and wireless laptops. Nonetheless,
mobile banking related to any operation that linked to
banking services like balance check, payments and
receiving banking SMS via a mobile device, and
account transactions [7]. Secondly, CSM depend on
©2012-17 International Journal of Information Technology and Electrical Engineering `
ITEE, 6 (2) pp. 40-45, APR 2017
41
ITEE Journal Information Technology & Electrical Engineering
ISSN: – 2306-708X
Volume 6, Issue 2 April 2017
some state of the art of web technologies like
Application Programming Interface (API), Web
Services, Web 2.0, and etc. [8]. Also, CSM is split into
four categories that are offered from a cloud provider:
Software as a Service (SaaS), Platform as a Service
(PaaS), Banking Process as a Service (BPaaS), and
Infrastructure as a Service (IaaS). Thirdly, CDM can be
split into four dissimilar types: Public cloud is made
obtainable to the general public or a huge industry group
and are possessed by a third party selling cloud services
[9]. Private Cloud is functioned and possessed by a
single organization or company that focuses on
controlling the mechanism of virtualizing resources and
automating services those are used and tailored by many
lines of business and essential groups [4]. Community
cloud falls among public and private clouds with regard
to the target set of consumers [10]. Community cloud,
this model is used by a specific group of community
within an organization that has the same worry,
objectives or security necessities [11]. Hybrid cloud
uses both public and private cloud methods, where it
smears the strategic notions of the services of public
cloud with the basis of the private cloud. Fourthly,
Cloud Risk Management (CRM): in Cloud computing,
risk required to be taken into consideration in all phases
of interactions and investigated at every service stage in
relation to the possessions that should be protected [12].
Besides, there are diverse types of risks that bank
management should be protected against. For numerous
banks, the main risk is credit risk but there are several
other risks that supervising authorities must notify
banks about connected criteria and require them to
follow [13]. There are eight phases for effective cloud
risk management like Cloud Risk Planning Phase
(CRPL), Cloud Risk Analysis (CRA) phase, Cloud Risk
Identification(CRI) phase, Cloud Risk
Prioritization(CRP) phase, Cloud Risk
Evaluation(CRE) phase, Cloud Risk Treatment(CRT)
phase includes four strategies for responding to cloud
risks: cloud risk mitigation, cloud risk avoidance, cloud
risk transfer, cloud risk elimination, cloud risk
acceptance, Cloud Risk Controlling(CRC) phase, and
Cloud Risk Communication & Documentation (CRCD)
phase. Finally, Cloud Security Issues Models (CSIM):
cloud security is a very common topic and any grouping
of policies, technologies, and controls to protect data,
infrastructure and services from possible attacks or
achieving business objectives all the security domains
should work in an effective manner [14].
3. CLOUD SECURITY ISSUES
Though, classification of critical security issues in
cloud banking is needed to be highlighted in this section
[15]: 3rd Party (Providers) and Policies Security Issues:
Lack of standards, Service Level Agreement (SLAs),
Governance, Legally and policy, Dependency, Lack of
transparency, Cloud service provider viability,
Malicious insiders, Regulatory compliance &
requirements, Shared technology issues, Unknown risk
profile, Trusted cloud, Abuse cloud computing;
Application and program (software) security issues:
Authentication, Authorization, Insecure Interfaces
API’s, Availability and Mobility, Portability and
Interoperability; Data and Information Security Issues:
Privacy, Confidentiality, Data Protection, Data
Limitations and Segregation, Data integrity and
scavenging, Data Location, Data Loss/Leakage,
Detection and Recovery, Hijacking of Account or
Service & Traffic; Security Control & Network Issues:
Information flow Controlling, Intrinsic Constrains of
Wireless Network, Network Access Schemes,
Bandwidth, Anonymity and Network Traffic Analysis,
Network Security, Virtual Network Protection, Limited
control, Distributed Denial of Service (DDoS),
Heterogeneity in Mobile cloud Devices, Platform
Reliability and Latency; Security and Service
Management Issues: Session Management,
Identity/Access Management, Quality of Service (QoS),
IT organizational changes; Physical Infrastructure
Security Issues: Flexibility Infrastructure, Single Point
to Attack and Failure, High-value cyber-attack targets,
the multi-tenancy, Scalability, Cost.
4. EMPIRICAL STRATEGY
The Delphi technique use to collect data as
qualified informants, so we focused on two cloud
developers groups and cloud IT managers in banking
organizations. In this regard the Delphi study is
modified to three phases like identifying, analyzing, and
evaluating as described in Figure 1. The data are
collected by secondary data and Delphi study. In current
study, the population samples of forty panelists were
chosen from inside and outside Malaysian banking
organizations according to their experienced in cloud
banking. Actually, we measure the probability of
occurrence according to a 10 scales (1= “very low
probability of occurrence risk” and 10 = “very high
probability of occurrence risk”), and the brutality of the
cloud security issues described on a 10 scales (1= “very
low influence risk” and 10 = “very high impact risk”.
Actually, we used Delphi techniques for data gathering
and analysis it in this study. However, we will begin a
list of cloud security issues based on secondary data,
experienced of cloud managers and cloud developers.
The Delphi method is collected data and aggregated of
cloud security issues. In fact, we divided the phases of
cloud Delphi technique into three phases such as
identifying, analyzing, and evaluating. However, we
illustrate the concept of Delphi technique for identifying
and classifying cloud security issues in Figure 1 as
follows:
Cloud Delphi Technique
Phase 1: Identifying Collected data and aggregated of cloud
security issues.
Select the experts from both inside and outside
the banking organization.
Divide panelist to two groups cloud
©2012-17 International Journal of Information Technology and Electrical Engineering `
ITEE, 6 (2) pp. 40-45, APR 2017
42
ITEE Journal Information Technology & Electrical Engineering
ISSN: – 2306-708X
Volume 6, Issue 2 April 2017
Figure 1: Illustrates the steps of cloud Delphi study of
collecting data [16]
5. METHODOLOGY (MATERIALS &
METHODS)
However, the data gathered for this study to be used
in the modelling is getting from the managers and cloud
developers in banking organizations. We propose
Artificial Neural Network (ANNs) for predicting cloud
security issues in banking organizations. In order to
manage and predict performance of cloud computing
security level, we can use artificial neural networks
methods. In order to establish the intelligent approaches,
first we need to model the relationship between cloud
computing issues. In addition, artificial neural networks
modelling are used as nonlinear statistical data model to
predict cloud-computing issues. Of course, IT managers
and cloud developers must use practical approaches,
methods, and tools to predict cloud security issues in
banking organization. Indeed, the back-propagation
algorithm is used in layered feed- forward ANNs where
the artificial neurons are structured in layers, and lead
their signals “forward”, and then the errors are
transmitted backwards. The neural network gets input
from input layers and yields the output to the output
layer and the processing can be done in hidden layers.
There must be only one input and output layer, however,
there may be an arbitrary number of hidden layers [17-
19]. Additionally, the BP algorithm should minimize
these errors, till the ANN learns the training data.
Typically the training initiates with random weights,
and the learning objective is to modify them so that the
error is reduced [17-19]. The design of procedures for
predicting cloud security issues using Levenberg-
Marquardt (LM) Based Back Propagation (BP)
Algorithm as follows:
1. Collect and prepare the data for cloud security issues based on Cloud Delphi Technique.
2. Assign an estimated probability of occurrence and severity of cloud security issues based on
security models.
3. Build a network analysis 4. Train the network: It generates the neural
network from a Cloud Delphi dataset with
known output data cases.
5. Test the network: A trained neural networks are used to test how well it does at prediction of
known and new output values.
6. Predict cloud security issues based models by using artificial neural networks for evaluating
the performance impact of CSI. A trained neural
network is used to predict unknown output
value.
6. RESULTS AND DISCUSSION
Indeed, we used the Levenberg–Marquardt based
Back Propagation (LMBP) Algorithms, as nonlinear
optimization to predict the performance. So we illustrate
the mean square error and Regression (R) values for the
Training, Validation and Testing as in Table 1.
Table 1 Illustrates the MSE and Regression values for the
three types Types Samples Training
data
(input)%
MSE R
Training 28 70% 4.94160×e-7 9.95213×e-1
Validation 6 15% 8.75807×e-6 9.79262×e-1
Testing 6 15% 1.95378×e-5 9.49600×e-1
Table 1 shows that the overall Mean Square Error
which measure the average squared errors between the
output data and targets data and Regression (R) which
measure correlation between the actual outputs data and
targets data for training, validation and testing samples.
The accuracy of prediction is observed, when the values of
R are closest to 1. Hence, if the dataset was trained by using
(LMBP) Algorithms, the performance obtained was in 3 epochs with 10 hidden neurons yields. The results indicated
that the LMBP algorithms are very efficiently for testing and
training networks. Although, a two-layered feed forward
network hidden neurons and networks are trained using
LMBP Algorithms as shown in Figure 2.
©2012-17 International Journal of Information Technology and Electrical Engineering `
ITEE, 6 (2) pp. 40-45, APR 2017
43
ITEE Journal Information Technology & Electrical Engineering
ISSN: – 2306-708X
Volume 6, Issue 2 April 2017
Figure 2 architecture and algorithms and progress of ANN
system
Figure 3 Performance of LMBP Algorithm (MSE vs.
Epochs)
Figure 4 error histogram with 20 bins based LMBP
Indeed, it is trained to measure the performance of networks
by using LMBP algorithms in Matlab R2013b.
Furthermore, we estimated the best validation performance
0.0000087581 at epoch 3 in Figure 3 and the error histogram
with 20 bins is illustrated in Figure 4. Therefore, regression
R values are measured the correlation between outputs and
targets. Hence, the results in the regression analysis plot are
perfect correlation between the outputs and targets as in
Figure 5. In addition, the one mean a close relation between
outputs and targets, zero a random relationship. LMBP is
nonlinear optimal models which used to measure accuracy
of the prediction model, the Mean Square Error (MSE) are
measured to determine the performance. The performance is
goodness, if the MSE is small.
Figure 5 Regression Analysis Plot – Levenber g-Marquardt
Backpropagation Algorithm
7. CONCLUSIONS
The concern of the study is to predict critical cloud
computing security issues using Artificial Neural
Network (ANNs) algorithms. However, we presented
the Levenberg–Marquardt based Back Propagation
(BP) Algorithms to predict the performance for cloud
security level. Also LMBP algorithm is applied to
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
10-10
10-5
Best Validation Performance is 8.7581e-06 at epoch 3
Me
an
Sq
ua
re
d E
rro
r (m
se
)
5 Epochs
Train
Validation
Test
Best
0
2
4
6
8
10
12
Error Histogram with 20 Bins
Ins
tan
ce
s
Errors = Targets – Outputs
-0.0
049
-0.0
0418
-0.0
0345
-0.0
0272
-0.0
02
-0.0
0127
-0.0
0055
0.0
00181
0.0
00907
0.0
01632
0.0
02358
0.0
03084
0.0
0381
0.0
04536
0.0
05262
0.0
05988
0.0
06714
0.0
0744
0.0
08166
0.0
08892
Training
Validation
Test
Zero Error
0.65 0.66 0.67 0.68 0.690.65
0.655
0.66
0.665
0.67
0.675
0.68
0.685
0.69
Target
Ou
tpu
t ~
= 0
.97
*T
arg
et
+ 0
.02
Training: R=0.99521
Data
Fit
Y = T
0.65 0.66 0.67 0.68 0.690.65
0.655
0.66
0.665
0.67
0.675
0.68
0.685
0.69
Target
Ou
tpu
t ~
= 1
.2*T
arg
et
+ –
0.1
4
Validation: R=0.97926
Data
Fit
Y = T
0.65 0.66 0.67 0.68 0.690.65
0.655
0.66
0.665
0.67
0.675
0.68
0.685
0.69
Target
Ou
tpu
t ~
= 1
.3*T
arg
et
+ –
0.2
3
Test: R=0.9496
Data
Fit
Y = T
0.65 0.66 0.67 0.68 0.690.65
0.655
0.66
0.665
0.67
0.675
0.68
0.685
0.69
Target
Ou
tpu
t ~
= 1
.1*T
arg
et
+ –
0.0
41
All: R=0.9596
Data
Fit
Y = T
©2012-17 International Journal of Information Technology and Electrical Engineering `
ITEE, 6 (2) pp. 40-45, APR 2017
44
ITEE Journal Information Technology & Electrical Engineering
ISSN: – 2306-708X
Volume 6, Issue 2 April 2017
estimate and test the performance of accuracy for
predicting cloud security level. ANNs are more
efficiently used for improving performance and learning
neural membership functions. Indeed, the performance
of cloud security is analyzed by using LMBP to give the
best performance in the predicting models.
Furthermore, we used the cloud Delphi technique for
data gathering and analyzing it in this study. In this
study, the samples of 40 panelists were selected from
inside and outside Malaysian banking organizations based on their experienced in banking cloud computing.
However, we have indicated that the LMBP is nonlinear
optimal models which used to measure accuracy of the
prediction model and to reduce the error between the
actual outputs and targets for training process, the Mean
Square Error(MSE) are measured to determine the
performance. The performance is goodness, if the MSE
is small as shown in Table 1. As future work, we intend to use another optimal technique with Artificial Neural
Network algorithms to predict and mitigate critical
security cloud issues.
8. Acknowledgements
This work is organized by the Welfare Association in
Palestine; financially supported by the Arab Monetary
Fund, and Bank of Palestine under the program name
(Academic Fellowship Program Zamalah). The authors
also would like to thank Al-Aqsa University, Gaza,
Palestine and Faculty of Information & Communication
Technology, Universiti Teknikal Malaysia Melaka
(UTeM), Malaysia.
References
[1] D. Hoang and L. Chen, “Mobile Cloud for Assistive
Healthcare (MoCAsH),” in 2010 IEEE Asia-Pacific
Services Computing Conference Mobile, (2010), pp.
325–332.
[2] J. Miler and J. Górski, “Supporting Team Risk
Management in Software Procurement and
Development Projects,” in 4th National Conference
on Software Engineering, (2002), pp. 1–15.
[3] J. Mounzer, T. Alpcan, and N. Bambos, “Integrated
Security Risk Management for IT-Intensive
Organizations,” in 2010 Sixth International
Conference on Information Assurance and Security,
(2010), pp. 329–334.
[4] H. Li, Y. Pu, and J. Lu, “A Cloud Computing
Resource Pricing Strategy Research-based on
Resource Swarm Algorithm,” in 2012 International
Conference on Computer Science and Service
System, (2012), pp. 2217–2222.
[5] Z. Gao, Y. Li, H. Tang, and Z. Zhu, “Management
Process Based Cloud Service,” in International
Conference on Cyberspace Technology (CCT 2013),
(2013), pp. 278–281.
[6] M. Alemu and A. Omer, “Cloud Computing
Conceptual Security Framework for Banking
Industry,” J. Emerg. Trends Comput. Inf. Sci., vol.
5, no. 12, pp. 921–930, (2014).
[7] A. Alzahrani, N. Alalwan, and M. Sarrab, “Mobile
Cloud Computing: Advantage, Disadvantage and
Open Challenge,” in Proceedings of the 7th Euro
American Conference on Telematics and
Information Systems, (2014), pp. 4–7.
[8] E. Aruna, A. Shri, and A. Lakkshmanan, “Security
Concerns and Risk at Different Levels in Cloud
Computing,” in 2013 International Conference on
Green Computing, Communication and
Conservation of Energy (ICGCE), (2013), pp. 743–
746.
[9] K. Beckers, J.-C. Kuster, H. Schmidt, and S.
Faßbender, “Pattern-Based Support for Context
Establishment and Asset Identification of the ISO
27000 in the Field of Cloud Computing,” in 2011
Sixth International Conference on Availability,
Reliability and Security Pattern-Based, (2011), pp.
327–333.
[10] S. Goyal, “Public vs Private vs Hybrid vs
Community-Cloud Computing: A Critical Review,”
International Journal of Computer Network and
Information Security, vol. 6, no. 3. pp. 20–29,
(2014).
[11] A. Khrisna and Harlili, “Risk Management
Framework with COBIT 5 and Risk Management
Framework for Cloud Computing Integration,” in
2014 International Conference of Advanced
Informatics: Concept, Theory and Application
(ICAICTA) Risk, (2014), pp. 103–108.
[12] M. Kiran, M. Jiang, D. Armstrong, and K. Djemame,
“Towards a Service Lifecycle based Methodology
for Risk Assessment in Cloud Computing,” in 2011
Ninth IEEE International Conference on
Dependable, Autonomic and Secure Computing,
(2011), pp. 450–457.
[13] M. Ahmadalinejad and S. Hashemi, “A National
Model to Supervise on Virtual Banking Systems
through the Bank 2 . 0 Approach,” ACSIJ Adv.
Comput. Sci. an Int. J., vol. 4, no. 1, pp. 83–93,
(2015).
[14] F. Al-anzi, S. Yadav, and J. Soni, “Cloud
Computing: Security Model Comprising
Governance, Risk Management and Compliance,”
in 2014 International Conference on Data Mining
and Intelligent Computing (ICDMIC), (2014), pp.
1–6.
[15] A. Elzamly, B. Hussin, S. A. Naser, K. Khanfar, M.
Doheir, A. Selamat, and A. Rashed, “A New
Conceptual Framework Modelling for Cloud
Computing Risk Management in Banking
Organizations,” Int. J. Grid Distrib. Comput., vol. 9,
no. 9, pp. 137–154, (2016).
[16] A. Elzamly, B. Hussin, and B. ASH, “Classification
of Critical Cloud Computing Security Issues for
Banking Organizations: A Cloud Delphi Study,” Int.
J. Grid Distrib. Comput., vol. 9, no. 8, pp. 137–158,
(2016).
©2012-17 International Journal of Information Technology and Electrical Engineering `
ITEE, 6 (2) pp. 40-45, APR 2017
45
ITEE Journal Information Technology & Electrical Engineering
ISSN: – 2306-708X
Volume 6, Issue 2 April 2017
[17] B. Ibrahim and A. Shanavas, “An Approach to
Predict SOA Security Vulnerabilities using Feed
Forward Artificial Neural Networks,” SIJ Trans.
Comput. Networks Commun. Eng., vol. 3, no. 4, pp.
54–58, (2015)
[18] S. Abu Naser, "Predicting learners performance
using artificial neural networks in linear
programming intelligent tutoring system."
International Journal of Artificial Intelligence &
Applications vol. 3, no. 2, pp.65-73, (2012) .
[19] S. Abu Naser, et al. "Predicting Student Performance
Using Artificial Neural Network: in the Faculty of
Engineering and Information Technology."
International Journal of Hybrid Information
Technology, vol. 8 no. 2, 221-228,(2015)
Authors’ information
Abdelrafe Elzamly, He got a Ph.D.
in Information and Communication
Technology from the Technical
University Malaysia Melaka (UTeM)
in 2016 with a record of about 20
publications. He received his Master
degree in Computer Information
Systems from the University of Banking and Financial
Sciences in 2006. He received his B.Sc. degree in Computer
from Al-Aqsa University, Gaza in 1999. He is currently
working as Assistant Professor in Al-Aqsa University as a
full time. Also, from 1999 to 2007 he worked as a part time
lecturer at the Islamic University in Gaza. Between 2010 and
2012 he worked as a Manager in the Mustafa Center for
Studies and Scientific Research in Gaza. His research
interests are in risk management, software and information
systems engineering, cloud computing security, and data
mining.
Burairah Hussin, He received his
Ph.D. degree in Management
Science-Condition Monitoring
Modelling, from the University of
Salford, UK in 2007. Before that, he
received a M.Sc. degree in
Numerical Analysis and
Programming from the University of Dundee, UK in 1998
and a B.Sc. degree in Computer Science from the University
of Technology Malaysia in 1996. He currently works as a
Professor at the Technical University Malaysia Melaka
(UTeM). He also worked as the Dean at the Faculty of
Information and Communication Technology, Technical
University of Malaysia Melaka (UTeM). His research
interests are in data analysis, data mining, maintenance
modelling, artificial intelligence, risk management,
numerical analysis, and computer network advising and
development.
Samy Abu Naser, He got a Ph.D. in
Computer Science from North
Dakota State University, USA in
1993. He received his M.Sc. Degree
in Computer Science from Western
Kentucky University, USA in 1989.
He received his B.Sc. Degree in
Computer Science from Western
Kentucky University, USA in 1987. He is currently working
as a professor in Al-Azhar University, he worked as the
Dean of the Faculty of Engineering and Information
Technology in AL-Azhar University, he worked as Deputy
Vice President for Planning & Quality Assurance, and he
worked as a deputy dean of the Faculty of Engineering and
Information Technology in Al- Azhar University. His
research interests are in data mining, artificial intelligent,
and risk management.
Tadahiro Shibutani, He received
the Ph.D. degree in mechanical
engineering from Kyoto
University, Kyoto, Japan, in 2000.
He was a Visiting Scholar with the
Center of Advanced Life Cycle
Engineering, University of
Maryland, in 2007. He is currently Associate Professor of
Center for Creation of Symbiosis Society with Risk with
Yokohama National University, Yokohama, Japan. His
research interests include physics of failure, health
monitoring, and risk management for engineering systems.
Mohamed Doheir, He is currently a
PhD candidate in Health Care
Management in University Technical
Malaysia Malaka (UTeM). He
received his M. Sc. degree in Internet
working Technology from University
Technical Malaysia Malaka (UTeM) in
2012. He received his B.Sc. Degree in Educational
Computer Science from Al Aqsa University- Gaza, Palestine
in 2006. His research interests are in Health care, Cloud
Computing and Network Simulation.