2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)最新文献

筛选
英文 中文
Alcohol Filled Side-Hole Fiber Tilted Fiber Bragg Grating for Temperature Measurements 用于温度测量的酒精填充侧孔光纤倾斜光纤布拉格光栅
R. K. Ahmed, K. Hajim
{"title":"Alcohol Filled Side-Hole Fiber Tilted Fiber Bragg Grating for Temperature Measurements","authors":"R. K. Ahmed, K. Hajim","doi":"10.1109/NTCCIT.2018.8681184","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681184","url":null,"abstract":"A compact temperature sensing element based on tilted fiber Bragg grating (TFBG) is filed with an alcohol and written in side-hole fiber. The sensing element is first proposed and experimentally demonstrated. The tilted fiber Bragg grating is written in side hole fiber. The transmission spectrum of TFBG sensor has two resonant dips. The wavelengths are sensitive to the change of refractive index of the traditional alcohol filled side-hole fiber. Experimental results show a high temperature sensitivity reaches to 15 pm/ °C for 10 mm TFBG length written in 7cm-long side hole fiber used which about 1.5 times higher than that of FBG sensing element.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Performance of Patch Antenna For IEEE 802.16e Applications Using Multi-layer Antenna Structure with Reflector 采用带反射器的多层天线结构改善IEEE 802.16e应用中的贴片天线性能
S. N. Nafea
{"title":"Improving Performance of Patch Antenna For IEEE 802.16e Applications Using Multi-layer Antenna Structure with Reflector","authors":"S. N. Nafea","doi":"10.1109/NTCCIT.2018.8681183","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681183","url":null,"abstract":"Low side lobe level with low cost multilayer antenna for IEEE 802.16e applications such as WiMAX over industrial, scientific, and medical (ISM) band (5.725 – 5.875) GHz was presented shows high gain of 12.60 dB and fort-to-back ratio (F/B) of 18.55 dB with bandwidth around 163 MHz. The proposed multilayer antenna with reflector (MAWR) composed of a single plane feeding patch printed on Rogers RT/ Duroid 5880 substrate, covered with four Rogers RO6006 superstrates while a reflector layer located under feeding patch. Adding superstrate and reflector layers caused performance improvement by increasing gain and bandwidth with input reflection coefficient and side lobe level reduction. Computer Simulation Technology (CST) Microwave Studio was used as simulation environment.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"58 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Posteriori Error Analysis for Semidiscrete Semilinear Parabolic Problems 半离散半线性抛物型问题的后验误差分析
Mohammad Sabawi
{"title":"A Posteriori Error Analysis for Semidiscrete Semilinear Parabolic Problems","authors":"Mohammad Sabawi","doi":"10.1109/NTCCIT.2018.8681193","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681193","url":null,"abstract":"Optimal order a posteriori error bounds in $L_{infty }(L_{2})$ norm are derived for semidiscrete semilinear parabolic problems using various assumptions on the forcing term. Standard continuous Galerkin (conforming) finite element method is employed. Our main tools in deriving these error estimates are the elliptic reconstruction technique, with the aid of Grönwall’s lemma and continuation argument.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"61 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132639455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Control of Reactive Power Based on Lévy Flight 基于lsamvy飞行的无功控制
Ali Abed aljabar Al-Samawi, A. Atiyah, Sarmed hmzah ail
{"title":"Control of Reactive Power Based on Lévy Flight","authors":"Ali Abed aljabar Al-Samawi, A. Atiyah, Sarmed hmzah ail","doi":"10.1109/NTCCIT.2018.8681188","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681188","url":null,"abstract":"Optimal power flow is the main economic problem in power system operation. The Modified Cuckoo Search for Reactive Power (MCSRP) based on conventional Cuckoo search algorithm is suggested in this paper to solve the problem of optimal reactive power. Minimization of loss in addition to the maximization of voltage stability led to reducing the overall cost of the system. To cope with these issues, the Cuckoo search has been presented to handle effectively in this problem. This proposed algorithm has been tested on IEEE 30 – bus system and the obtained result are compared to that from another algorithm. Simulation result show that the proposed algorithm is more efficient for solving the objective function in power loss system. This algorithm is a practical study to calculate energy losses and is the best method used in economic calculations.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123047339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LTE Signal Detection Using Two-Stage Cooperative Compressive Sensing System 基于两级协同压缩感知系统的LTE信号检测
M. M. Ali, M. Alghrairi, E. H. Salman
{"title":"LTE Signal Detection Using Two-Stage Cooperative Compressive Sensing System","authors":"M. M. Ali, M. Alghrairi, E. H. Salman","doi":"10.1109/NTCCIT.2018.8681191","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681191","url":null,"abstract":"The limited resources of spectra is still an issue for internet of things, commercial transmissions, high power consumed in front ends, and green communications applications. In this paper, a compressive sensing to detect a wideband long term evolution (LTE) signal has been proposed. Since such signals have a higher power, costly receiver hardware is required. In literature, many of traditional compressive sensing systems are suffered from mathematical complexity to reconstruct the original signals. Nonetheless, the reconstruction process is not required in the proposed system rather than the noise is decreased to enhance the sensing process. To achieve this goal, the proposed system contains two compression cascaded stages; discrete Daubechies transform and discrete cosine transform. The results uncovered significant sensing performance with a more than 50% compression ratio for centralized cooperative secondary users.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117338696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of Trajectories Similarity Measures in Mining Algorithms 轨迹相似性度量在挖掘算法中的研究进展
Musaab Riyadh, N. Mustapha, Dina Riyadh
{"title":"Review of Trajectories Similarity Measures in Mining Algorithms","authors":"Musaab Riyadh, N. Mustapha, Dina Riyadh","doi":"10.1109/NTCCIT.2018.8681186","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681186","url":null,"abstract":"Trajectory similarity can be defined as the cost of transforming one trajectory into another based on certain similarity function. It is the core of numerous mining tasks such as clustering, classification, outlier detection, and indexing. Various approaches have been suggested to measure the similarity between pair of trajectories based on their geometric properties, the overlapping between their segments, the confined area between them, and semantic concept. This study aims to highlight and evaluate these approaches in term of their computational cost, usage memory, accuracy, and the amount of data, which is required to process in advance in order to determine its suitability to static or stream mining applications. The evaluation results concludes that the stream mining applications support similarity methods which have low computational cost and memory, single scan on data, and free of mathematical complexity due to high speed generation of data.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm 基于指纹图像能量特性选择数据隐藏算法块的安全生物识别系统实现
Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem
{"title":"Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm","authors":"Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem","doi":"10.1109/NTCCIT.2018.8681181","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681181","url":null,"abstract":"this paper is using the fingerprints as a biometric technique to ensure the security of the system. The steganography technique used for hiding data, the image media file is used as cover then embedding the secret data (feature and PIN) inside it.The procedure of this work includes taking the fingerprint image of the person, after that the image should be enhanced due to its low quality and preprocessing steps. After that is dividing the image to numbers of blocks and extracting the features such as (probability to each gray levels, mean, energy and effective pixels to each block) from this image by using Particle Swarm optimization (PSO) algorithm.Later the cryptography step is implemented based on feature that will be taken from nature inspired algorithm. Finally, selecting two hundred blocks from eight images to same person (fingerprint) to work for a high capacity based on histogram reversible data hiding algorithm with a comparatively lower deformation introduced after inserting the secret message.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116217595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint RRH Selection and Power Allocation forEnergy-Efficient C-RAN Systems 高效C-RAN系统的联合RRH选择和功率分配
I. Hburi, H. Khazaal
{"title":"Joint RRH Selection and Power Allocation forEnergy-Efficient C-RAN Systems","authors":"I. Hburi, H. Khazaal","doi":"10.1109/NTCCIT.2018.8681192","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681192","url":null,"abstract":"This paper addresses the energy efficiency (EE) based Remote Radio Heads (RRHs) selection problem in cloud radio-access network. In specific, a low-complexity 2-stage iterative algorithm is developed for this purpose by jointly employing the coordinated multi-point (CoMP) and user-clustering techniques. The first stage of the algorithm comprises of two steps, the first step applies a greedy search to activate preferred RRHs for CoMP transmission. The second step forms corresponded user clusters, only a RRH j with good channel gain could be included in the serving cluster of user k. Next, in the second stage, a simple interior point method is utilised for power control. Our obtained findings confirm that the transmit power, RRH density, and the number of users served by these RRHs can significantly affect the EE. Also, the results show that under certain system settings the proposed scheme can reduce the number of active RRHs in the network by almost 13.3% compared to conventional CoMP technique applied in LTE-A standard.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Suitability of Using Julia Set Images as a Cover for Hiding Information 使用Julia集图像作为隐藏信息的封面的适用性
N. Q. Mohammed, Q. M. Hussein, M. S. Ahmed
{"title":"Suitability of Using Julia Set Images as a Cover for Hiding Information","authors":"N. Q. Mohammed, Q. M. Hussein, M. S. Ahmed","doi":"10.1109/NTCCIT.2018.8681185","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681185","url":null,"abstract":"Steganography is a technique that is used to secret information in a cover media that ensure the secrete of messages and their existence, not notice from others. A blind steganography means that secret information can be extracted without need the original cover image. Different types of media are used as a cover in stenography techniques, such as text, image, audio or video. One of these techniques was the image that created by using algebraic Fractals, Julia set is a type of algebraic fractal, which it can be used as a cover to embedded text or images in blind steganography technique. This method used in many thesis and papers. The aim of this paper focuses on the weak points and limitations of using fractal images, especially Julia sets images, as a cover in steganography system that may contribute in detect the hidden information within these images. The importance of this paper, it gives a hint to steganography system designer to avoid these weak points which threat the security of their systems.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory 基于博弈论的密码学家和攻击者选择密码系统密钥的最佳策略
Dr. Sattar B. Sadkhan, Dhilal M. Reda
{"title":"Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory","authors":"Dr. Sattar B. Sadkhan, Dhilal M. Reda","doi":"10.1109/NTCCIT.2018.8681178","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681178","url":null,"abstract":"One of the most important strength features of crypto-system’s is the key space. As a result, whenever the system has more key space, it will be more resistant to attack. The weakest type of attack on the key space is Brute Force attack, which tests all the keys on the ciphertext in order to get the plaintext. But there are several strategies that can be considered by the attacker and cryptographer related to the selection of the right key with the lowest cost (time). Game theory is a mathematical theory that draws the best strategies for most problems. This research propose a new evaluation method which is employing game theory to draw best strategies for both players (cryptographer & attacker).","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"30 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信