Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
Exploiting Search Engines for Attacking Database Exposed to Internet
1
12
EN
N. M. A.
Ayad
Computer & Network, Reactor Department Atomic, Energy Authority
H. M.
Klash
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University
H.
Sorour
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University
10.21608/mjeer.2012.63696
Database security has recently become a victim of misused search engines. Hackers use search engines to find potentially vulnerable web applications to attack. The search engine doesn’t actually execute any attacks; rather it is used to quickly locate “soft targets” among the vast number of sites on the internet. Hackers have started to use search engines to find web facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. This paper shows how hacker can target the vulnerable sites with attacks designed to exploit the specific holes discovered by the search engine
https://mjeer.journals.ekb.eg/article_63696.html
https://mjeer.journals.ekb.eg/article_63696_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
Exploiting Search Engines for Attacking Database Exposed to Internett.
1
12
EN
N. M. A.
Ayad
Computer & Network, Reactor Department Atomic, Energy Authority
H. M.
Klash
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University
H.
Sorour
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University
10.21608/mjeer.2012.66887
Database security has recently become a victim of misused search engines. Hackers use search engines to find potentially vulnerable web applications to attack. The search engine doesn’t actually execute any attacks; rather it is used to quickly locate “soft targets” among the vast number of sites on the internet. Hackers have started to use search engines to find web facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. This paper shows how hacker can target the vulnerable sites with attacks designed to exploit the specific holes discovered by the search engine
https://mjeer.journals.ekb.eg/article_66887.html
https://mjeer.journals.ekb.eg/article_66887_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University
13
22
EN
N. A.
EL-FESHAWY
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University
H. H.
EL-BANNA
Electronic Engineering department, Military Technical College
R. E.
EL AZIZ
High Institute of Engineering, Computer department, 6 October University
10.21608/mjeer.2012.66897
<span>This paper presents a method for recognizing human faces from video with complex backgrounds. This approach is based on the comparison between the original face template and the face area in the video. First, the video is converted to images. Then the Genetic Algorithm “GA” is used to get the assigned face area from the images by using fitness function depends on the intensity values of the image. In addition, the lighting effects and image size of the faces are considered and solved in this method. Experiments demonstrate that this face detector provides promising results for the images of individuals.</span>
https://mjeer.journals.ekb.eg/article_66897.html
https://mjeer.journals.ekb.eg/article_66897_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
A Wideband Variable Gain Amplifier using 0.13m CMOS Technology
23
32
EN
Abd El-Moneam Abd El-Bary
Nasser
Department of Electronics and Communications, Arab Academy for Science and Technology, Alexandria, Egypt
Amr E.
Rizk
Department of Electronics and Communications, Arab Academy for Science and Technology, Alexandria, Egypt
10.21608/mjeer.2012.66904
A wideband variable gain amplifier (VGA) design is introduced with two different schemes. It is based on a fully differential amplifier with resistive loads and a Negative Miller Capacitance technique is used to increase the bandwidth of the amplifier. The amplifier consists of three stages and the gain is varied using the second and third stages, where they are degenerated by a voltage controlled variable resistance. The design is ready to be implemented with MOSFETs using UMC 0.13mm technology. The supply voltage is 1.2V, and achieved gain is up to 35 dB with a minimum bandwidth of 1 GHz. Two design schemes are discussed, describing the tradeoff between the dynamic range of the variable gain and the bandwidth.
https://mjeer.journals.ekb.eg/article_66904.html
https://mjeer.journals.ekb.eg/article_66904_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure
33
43
EN
Ahmed A.
Abou El-Fadl
Faculty of Engineering, King Abdulaziz University, Rabigh, K.S.A
Mahmoud A.
Wafa
Faculty of Engineering, King Abdulaziz University, Rabigh, K.S.A
10.21608/mjeer.2012.66906
<span>A numerical model of x-cut LiNbO3 optical modulator with a two step back slot structure to satisfy the velocity matching condition without the layer of silicon dioxide is presented. The analysis is based on the method of transverse technique. An equivalent circuit is deduced to represent the structure. Generalized trial quantities are introduced as virtual adjustable sources in the equivalent network representation of boundary conditions. The lossy conductor of a planar transmission line is represented by a particular two port network. Thus, metallic losses can be evaluated for any metallization thickness without restricting the conductor modeling to a simple surface impedance approximation. The dependence of the effective microwave index, the characteristic impedance and the product of the drive voltage and the electrode interaction length on the thickness of substrate near the ground electrode has been investigated. The optical response of the modulator is also evaluated. This modulator is sufficient to 40 Gb/s optical transmission systems.</span>
https://mjeer.journals.ekb.eg/article_66906.html
https://mjeer.journals.ekb.eg/article_66906_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
Indoor Geolocation System Based on Time of Arrival Technique
44
54
EN
Adel A.
Saleeb
Faculty of Electronic Engineering, Minufiya University, Egypt
Mahmoud G. T.
Elkholy
Faculty of Electronic Engineering, Minufiya University, Egypt
Zeinab M.
Elsherbieny
Faculty of Electronic Engineering, Minufiya University, Egypt
10.21608/mjeer.2012.66911
Indoor geolocation systems have applications in safety, military and nursing homes. This paper is concerned with the geolocation system based upon time of arrival technique. The success of the time of arrival technique depends largely upon the position of the reference nodes. The optimum position of the reference nodes is found. There are errors in the measurement of time of arrival. The effect of these errors is studied. The failure rate and root mean square error (RMSE) in tag position are computed. Uncertainty in the positions of reference nodes and its effect upon failure rate and RMSE is also computed
https://mjeer.journals.ekb.eg/article_66911.html
https://mjeer.journals.ekb.eg/article_66911_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
22
1
2012
01
01
Control of Heart Irregularities Using Threshold Chaotic Control
55
65
EN
Nessim
Mohaadym
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Tanta University, Egypt
A. A. A.
Nasser
Arab Academy for Science and Technology, Alexandria, Egypt
S.
Khamis
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Tanta University, Egypt.
10.21608/mjeer.2012.66914
Chaotic conditions of the human heart cause arrhythmia. Once heart rhythm, chaos control through thresholding control can be applied. In this paper, a non-linear equivalent circuit, for simulating heart behavior is suggested and tested. It is based on a set of differential equations that models heart dynamics. The strategy here simply involves monitoring a single state variable and resetting it when it exceeds a predetermined threshold. The success of the technique manifests itself in rapidly controlling different chaotic electrical cases including heart arrhythmia by enforcing the heart to resume structure stability. The described thresholding control technique has proven to be applicable to rhythm disorders including, fibrillation, bradycardia (heart slowness), tachycardia (rapid or accelerated), flutter, intermittency, and even cardiac arrest. The controller designs described here can lead to the development of future smart clinical pacemakers.started, it can lead to death if left uncontrolled. To retain normal
https://mjeer.journals.ekb.eg/article_66914.html
https://mjeer.journals.ekb.eg/article_66914_d41d8cd98f00b204e9800998ecf8427e.pdf