Alzilal Kamal Algezoly, F. Abdulrazzak, Sharaf A. Alhomdy
{"title":"OpenFlow Protocol Based on UserSpace (OFUS)","authors":"Alzilal Kamal Algezoly, F. Abdulrazzak, Sharaf A. Alhomdy","doi":"10.1109/ICOICE48418.2019.9035186","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035186","url":null,"abstract":"In recent years, there is a general tendency in the field of networking to use programmable networks. One of the most important types of networks that have gained more attention is the Software Defined Networks (SDN), which is based on the principle of separation between the control plane and the data plane. This in turn made the network control centralized and programmable through a centralized controller that is managed by a protocol called OpenFlow. When the main OpenFlow protocol is used, the challenge of time usage in the process of creating communication channels becomes evident each time packets are transmitted. Therefore, this research intends to propose an enhanced algorithm to improve the network performance by integrating the idea of userspace that was successful with operating systems and activating it within SDN networks. The proposed OpenFlow based on UserSpace (OFUS) has been analyzed and compared to the OpenFlow-enabled SDN networks in terms of Round Trip Time (RTT) and the network throughput as performance measurements. The comparative analysis was made by using the open-source Mininet network simulator. The comparative analysis done by using open-source Mininet network simulator on four types of topologies. The results of the enhanced algorithm OFUS showed that the performance of the network has been improved for the RTT and throughput compare to OpenFlow-enabled networks. The RTT in single, linear, tree and custom topologies are 40.3%, 36.2%, 51% and 20.4% whereas throughput 65.4%, 57%, 104.2% and 25.6% respectively.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Enlargement using Biharmonic DP-Ball Surface","authors":"A. Kherd, A. Saaban, Ibrahim Eskandar","doi":"10.1109/ICOICE48418.2019.9035185","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035185","url":null,"abstract":"an image enlargement has intensified in many studies due to its novel approach of re-sizing image through scaling up or scaling down. Consequently, it allows smaller image to fit a larger screen when it is in a full display mode. It is also applicable in reducing higher image resolution into a lower image resolution. Conversely to some of its limitations, this study focuses on double enlargement of the original image by employing biharmonic cubic DP-Ball with respect to four boundary curves condition. Seven grey-scale test images are used in order to study the performance of the method. The performance indicator namely Peak Signal to Noise Ratio (PSNR) is used to compare the ability of the method compared to some existing methods.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Zahid, Ibrahim Hasan Mohammed Salih Al-Kharsan, H. Bakarman, Muntadher Faisal Ghazi, Hanan Abbas Salman, F. Hasoon
{"title":"Biometric Authentication Security System Using Human DNA","authors":"A. Zahid, Ibrahim Hasan Mohammed Salih Al-Kharsan, H. Bakarman, Muntadher Faisal Ghazi, Hanan Abbas Salman, F. Hasoon","doi":"10.1109/ICOICE48418.2019.9035151","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035151","url":null,"abstract":"the fast advancement in the last two decades proposed a new challenge in security. In addition, the methods used to secure information are drawing more attention and under intense investigation by researchers around the globe. However, securing data is a very hard task, due to the escalation of threat levels. Several technologies and techniques developed and used to secure data throughout communication or by direct access to the information as an example encryption techniques and authentication techniques. A most recent development methods used to enhance security is by using human biometric characteristics such as thumb, hand, eye, cornea, and DNA; to enforce the security of a system toward higher level, human DNA is a promising field and human biometric characteristics can enhance the security of any system using biometric features for authentication. Furthermore, the proposed methods does not fulfil or present the ultimate solution toward tightening the system security. However, one of the proposed solutions enroll a technique to encrypt the biometric characteristic using a well-known cryptosystem technique. In this paper, an overview presented on the benefits of incorporating a human DNA based security systems and the overall effect on how such systems enhance the security of a system. In addition, an algorithm is proposed for practical application and the implementation discussed briefly.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"38 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Uplink Detection Performance in Large Scale MU-MIMO Systems with Different Scenarios","authors":"Amr A. Alammari, M. Sharique, A. A. Moinuddin","doi":"10.1109/ICOICE48418.2019.9035195","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035195","url":null,"abstract":"In this paper, a very large-scale antenna Multiple input multiple output (MIMO) system to accommodate multi users is considered in a single cell uplink scenario. Each user has a single antenna and all the users are uniformly distributed in the cell. Maximum Ratio Combining (MRC) and Zero forcing (ZF) linear detectors are considered at the base station (BS). Uplink achievable rate performance over Rayleigh fading channel has been evaluated considering both the channel certainty and channel uncertainty conditions. The effect of the power scaling on the achievable rate performance of the two linear receivers has also been investigated. The comparative analyses on the uplink achievable rate of MRC detector with ZF detector have been discussed. Simulation results show that the increase in the number of users will result in increasing the gap between the two detectors performance. Performance in terms of Average Bit Error rate (ABER) of the linear detectors in large-scale MIMO has been also evaluated by considering only the channel certainty condition. The effect of increasing the antenna count and average transmit power on the ABER in the uplink scenario have been considered, as well.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salah Al-Hagree, Maher Al-Sanabani, Mohammed Hadwan, M. Al-Hagery
{"title":"An Improved N-gram Distance for Names Matching","authors":"Salah Al-Hagree, Maher Al-Sanabani, Mohammed Hadwan, M. Al-Hagery","doi":"10.1109/ICOICE48418.2019.9035154","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035154","url":null,"abstract":"N-gram distance (N-DIST) was developed by Kondrak's lately to measure the distance between two strings. It was found that, this distance could be computed by a smart dynamic programming procedure. The N-DIST has played important roles in a wide array of applications due to its representational and computational efficiency. To effect a more sensible, distance measure, the normalized edit distance was proposed. Many algorithms and studies have been dedicated along this line with impressive performances in last years. There is, however, a fundamental problem with the original definition of N-DIST that has remained without improved: its context-free nature. In determining the possible actions, i.e., deletion, insertion, transposition and substitution, consider work was given to the local behaviors of the string question that indeed encompass great amount of useful information concerning its content. In this proposed framework, two operations are developed. The original N-DIST algorithm does not consider the transposition operations and the algorithm has fixed the cost of insertion and deletion operations. In addition, the proposed E-N-DIST algorithm computes the costs of substitution and transposition operations is dependent on 2n+1- 1 states while the original N-DIST algorithm has been only dependent on 2n states. In this paper, the experiments carried out show the E-N-DIST algorithm, which gives a sort of results that are more accurate than the algorithms under discussion.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Yemeni Paper Currency Detection System","authors":"Ghazi Alnowaini, Aisha Alabsi, Heba Ali","doi":"10.1109/ICOICE48418.2019.9035192","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035192","url":null,"abstract":"With the great technological advances in colour printing, duplicating and scanning, counterfeit notes haves posed an increasing threat to currency markets all over the world. Over the past few years, the Yemeni currency market has suffered extensively from this problem. Although the Yemeni Paper Counterfeit- Currency Detection System (YPCDS) has made steps to counter this problem, it is limited to the 1000 denomination, leaving a considerable chance for counterfeiting other dominations. This paper offers a technical remedial solution to this problem for all denominations using image processing and machine learning techniques. The main aim of this system is to create an automatic system robot to recognize and detect Yemeni paper currency genuine or counterfeit. The system framework consists of five phases: acquisition of the currency image, preprocessing, feature extraction, classification, and verification. MATLAB is the main program for creating this system. The efficacy of the system was tested experimentally using four Yemeni currency categories and the system was found to be able to detect whether currency is genuine or counterfeit with high accuracy and fast processing time.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Q. Shaddad, A. Saeed, Refaat Q. Naji, Abdulmajeed M. Baalawi
{"title":"Hybrid Traffic Dispersion and Network Densification Scheme for 5G Millimeterwave Wireless Networks","authors":"R. Q. Shaddad, A. Saeed, Refaat Q. Naji, Abdulmajeed M. Baalawi","doi":"10.1109/ICOICE48418.2019.9035153","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035153","url":null,"abstract":"Recent trends in research and scientific studies are represented in developing the wireless communication systems to achieve 5G networks with ultra-high reliability, ultra-low latency, high capacity, large amount of data transfer, massive connection density, while improving the quality of service (QoS). Achieving ultra-low latency is one of the fundamental goals for 5G wireless networks to enable new services and applications such as, virtual reality, live content streaming, automated vehicle control, internet of things (IoT) where machines and tools can be controlled remotely with extreme response, and many delay sensitive applications over the mobile network. This paper investigates hybrid strategy of traffic dispersion and network densification, which aims to split and transmit an arrival traffic over multiple different paths within the ultra-dense network. This improved the capacity of, and reduced the communication delay in, planned 5G-wireless network for urban area in Taiz city, Yemen. For our proposed 5G-wireless network there are 376 microcells, which operates using millimeter-Wave (mm-Wave) with the 73 GHz band, and used as providers for 274702 subscribers within the covered urban area of Taiz city. The planned 5G-network is carried out using OMNET++ and MATLAB simulation tools, hence the performance of this network is evaluated by key performance indicators (KPIs) such as average throughput, and communication delay. Based on the obtained results the amount of network throughput has reached a high value, up to 9 Gbps at each cell, with 88% probability that average one hop delay less than 0.5 ms.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123589039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Bahamish, Naziha Al-Aidroos, Aziz Nasser Boraik
{"title":"Bat Algorithm for Protein Conformational Search","authors":"H. Bahamish, Naziha Al-Aidroos, Aziz Nasser Boraik","doi":"10.1109/ICOICE48418.2019.9035182","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035182","url":null,"abstract":"Determining the lowest protein free energy conformation (protein structure) is consider NP-hard problem. In this paper, the bat algorithm was applied to the protein conformational search problem. It utilized torsion angles protein representation, ECEPP energy function, and bats behavior to explore the protein conformational search space. Met-enkephalin a small protein used normally as a benchmark of protein conformational search algorithms was used to test the algorithm. Computational experiments showed that the applied algorithm found the reported lowest energy (-12.91 kcal/mol) conformation for ECEPP/2 and (-12.43 kcal/mol) conformation for ECEPP/3.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Alsamhi, Hasan Mohsen Aljabali, Mohd Najim, A. Srivastava, Mohd Samar Ansari, Liang Zhao, Sau Van Nguyen Van, S. Gupta, Amr A. Alammari, Akram Hatem Saber, M. Hebah, Marwan Ahmed Abdullah Alasali
{"title":"Tethered Balloon Technology for Green Communication in Smart Cities and Healthy Environment","authors":"S. Alsamhi, Hasan Mohsen Aljabali, Mohd Najim, A. Srivastava, Mohd Samar Ansari, Liang Zhao, Sau Van Nguyen Van, S. Gupta, Amr A. Alammari, Akram Hatem Saber, M. Hebah, Marwan Ahmed Abdullah Alasali","doi":"10.1109/ICOICE48418.2019.9035189","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035189","url":null,"abstract":"The development and adopting of advanced communication technologies provide mobile users more convenience to connect any wireless network anytime and anywhere. Therefore, a large number of base stations (BS) are demanded keeping users connectivity, enhancing network capacity, and guarantee a sustained users Quality of Experiences (QoS). However, increasing the number of BS leads to an increase in the ecological ad radiation hazards. In order to green communication, many factors should be taken into consideration, i.e., saving energy, guarantee QoS, and reducing pollution hazards. Therefore, we propose tethered balloon technology that can replace a large number of BS and reduce ecological and radiation hazards due to its high altitude and feasible green and healthy broadband communication. The main contribution of this paper is to deploy tethered balloon technology at different altitude and measure the power density. Furthermore, we evaluate the measurement of power density from different height of tethered balloon comparison with traditional wireless communication technologies. The simulation results showed that tethered balloon technology can deliver green communication effectively and efficiently without any hazardous impacts.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pre-service Teachers' Usage of Internet Technology at Faculty of Education-Amran University, Yemen","authors":"Abddulsalam Al-Hadabi, Mamsoor Al-Abdi","doi":"10.1109/ICOICE48418.2019.9035196","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035196","url":null,"abstract":"This study aimed to find out the usage of internet technology among the pre-service teachers at Faculty of education in Amran University, Yemen. To bring about this aim, a descriptive research design (i.e. survey, and open interview) was used. A constructed questionnaire includes 28 items that were distributed on three domains of the internet usage: academic, professional and general internet usage. Interview, as an aid tool, was used to explore the reasons beyond why some of the study subjects did not answer the questionnaire. Results of the questionnaire revealed that most of the subjects utilize the internet but not in favor of development their academic, or profession specialization as teachers in the future. On the other hand, the results of the interview showed that reasons beyond why some subjects did not answer the questionnaire were: the absence of internet usage facilities for them as well as the negative attitudes towards its usage. Based on the results of the study, some recommendations were recommended.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117314730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}