2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)最新文献

筛选
英文 中文
Performance Investigation of 5G-Mobile Fronthaul using Analog RoF Technology 基于模拟RoF技术的5g移动前传性能研究
S. Jawad, R. Fyath
{"title":"Performance Investigation of 5G-Mobile Fronthaul using Analog RoF Technology","authors":"S. Jawad, R. Fyath","doi":"10.1109/NTCCIT.2018.8681177","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681177","url":null,"abstract":"This paper presents the transmission performance of 5G mobile fronthaul based on the aggregation of multiple intermediate frequencies over a radio-over-fiber platform. Four scenarios describing the environment of single mode-fiber link are investigated for efficient bandwidth transmission. The effect of fiber transmission link parameters like dispersion, attenuation, transmission distance, lunch power, and number of aggregated signals are reported for three modulation formats (QPSK, 16QAM, and 64QAM). Increasing the transmission capacity by going toward wavelength division multiplexing with 1 GHz-channel bandwidth is discussed. The simulation reveals that the maximum transmission distance of 16x200 MHz-bandwidth mobile signals over SMF operating at 1550 nm is 82, 69, and 25 km with bit rates 10.24, 20.48 and 30.72 GB/s for QPSK, 16QAM and 64QAM, respectively, at launch power equal to 0 dBm. These values are to be compared with 29, 20 and 13 km (9.6, 51.2 and 76.8 Gb/s), respectively, when 8x1 GHz-bandwidth signals are transmitted.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116702097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A 60 GHz Pattern-Reconfigurable Antenna Design Using a Suspended Parasitic Pixel Layer 基于悬浮寄生像素层的60 GHz模式可重构天线设计
M.W. Mustafa, Lubab A. Salman
{"title":"A 60 GHz Pattern-Reconfigurable Antenna Design Using a Suspended Parasitic Pixel Layer","authors":"M.W. Mustafa, Lubab A. Salman","doi":"10.1109/NTCCIT.2018.8681182","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681182","url":null,"abstract":"A 60 GHz multifunctional reconfigurable antenna (MRA) capable of operating in fifteen modes corresponding to fifteen steerable beam directions is presented. The MRA consists of an aperture coupled rectangular patch antenna as the main radiator and a suspended parasitic layer consisting of a thin dielectric support with a grid of 5 x 5 square metallic pixels. Adjacent pixels can be connected or disconnected by means of electronic switches turning the grid into a reconfigurable set of parasitic elements. This in turn controls the current distribution over the extent of the parasitic layer enabling therefore different beam steering directions with minimal impact on the antenna bandwidth and operating frequency. Simulation results show a common impedance bandwidth of about 4.6% at 60 GHz for all fifteen modes of operation with realized gains ranging from 6.82 to 9.47 dBi. Side-lobe levels are well above 8 dB for most modes of operation with half-power beam widths in the range of 49° to 106°.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring and Controlling the Temperature of Vertical Booster Pump Using Arduino Board 基于Arduino板的立式增压泵温度监测与控制
H. Dawood
{"title":"Monitoring and Controlling the Temperature of Vertical Booster Pump Using Arduino Board","authors":"H. Dawood","doi":"10.1109/NTCCIT.2018.8681175","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681175","url":null,"abstract":"Monitoring and control play a very critical role in oil industry. Continuous measurement and control of the temperature of Vertical Booster Pumps (VBP) in crude oil depot has been a critical issue to keep away the hazards and damage. A HIMA F 6101 card is used in the current system to achieve the purpose above but this card is now absolute. This means that the manufacturer no longer produces this kind of card. Hence if the card in use is damaged the VBP will be out of service. That is why a new system is proposed in this paper as an alternative using an Arduino board. A case study has been carried out to evaluate the performance of the new system. It has been found out that this new system is good for monitoring the temperature and it acts properly when the temperature exceeds a threshold.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125028853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Key Generation Algorithm based on Dynamical Chaotic Substitution Box 基于动态混沌替换盒的密钥生成新算法
Riyam N. AL-Zubaidy, E. Al-Bahrani
{"title":"New Key Generation Algorithm based on Dynamical Chaotic Substitution Box","authors":"Riyam N. AL-Zubaidy, E. Al-Bahrani","doi":"10.1109/NTCCIT.2018.8681187","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681187","url":null,"abstract":"Through this paper, new key generation algorithm as pseudo-random number generator for block cipher cryptosystem is presented. In the proposed algorithm, a new dynamical substitution boxes (s-boxes) are created by using chebyshev chaotic map. Each s-box consists of 16×16 hexadecimal numbers where each row contains 16 different non-repeated hexadecimal numbers. A random choosing of two different rows from the created s-box is performed by using exponential chaotic map. These two selected rows are XORed to obtain 8 byte (64-bits) random numbers in reach iteration. The experimental results of NIST tests, statistical analysis and security analysis stated that the suggested generator can be used for generating secure and random sequence which can be used in cryptographic applications.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127544356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
NTCCIT 2018 Author Index NTCCIT 2018作者索引
{"title":"NTCCIT 2018 Author Index","authors":"","doi":"10.1109/ntccit.2018.8681176","DOIUrl":"https://doi.org/10.1109/ntccit.2018.8681176","url":null,"abstract":"","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fractal and Chaos in for Highly Secured Cryptosystem 高度安全密码系统的分形与混沌
N. Al-Saidi
{"title":"Fractal and Chaos in for Highly Secured Cryptosystem","authors":"N. Al-Saidi","doi":"10.1109/NTCCIT.2018.8681172","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681172","url":null,"abstract":"With the rapid development in the communications and information transmissions, there is a growing demand for new approaches that increase the security of cryptographic systems. Therefore, some emerging theories, such as fractals chaos can be adapted to providing a contribution toward this goal. They have properties, which have been extensively studied over the years and derive their inherent complexity from the extreme sensitivity of the system to the initial conditions and other features, which ensure a sufficient level of randomness. The fractal algorithm can resist the known attacks due to the open key space and big key size. The “cumulative and truncation errors” accompanying the numerical solution of the non-linear system posed a difficulty for the algorithm to obtain imprecise decimal numbers.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117231755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G and Next Generation Networks 5G和下一代网络
A. Kadhim
{"title":"5G and Next Generation Networks","authors":"A. Kadhim","doi":"10.1109/NTCCIT.2018.8681173","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681173","url":null,"abstract":"This lecture provides a brief review of recent trends and technologies that inspired by 5G and Next Generation Networks (NGN). The generations of wireless and mobile systems are introduced first together with the related standardization bodies. The 5G and NGN main requirements and features are then covered. This is followed by the main challenges driven by current networks such as Enhanced Mobile Broadband, Massive Internet of Things (IoT), and Critical Communications and Control. The 5G enabler technologies also introduced covering High Band Millimeter Wave, Advanced Antenna Technology, Efficient Modulation and Coding schemes, and Software-Based Networking. The edge computing and its effect on network performance in relation to Cloud Radio Access Network (C-RAN) and Fog Computing issues are presented. The role of Software Defined Network (SDN) / Network Function Virtualization (NFV) in 5G and NGN is introduced with great value shift towards operations management and orchestration. Finally, some successful 5G deployment stories are demonstrated.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128112696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Handwritten Recognition based on Hybrid ANN and Wavelet Transformation 基于混合神经网络和小波变换的手写体识别
S. Sadkhan, Sabiha F. Jawad- SMIEEE
{"title":"Handwritten Recognition based on Hybrid ANN and Wavelet Transformation","authors":"S. Sadkhan, Sabiha F. Jawad- SMIEEE","doi":"10.1109/NTCCIT.2018.8681190","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681190","url":null,"abstract":"This paper provides the application of Artificial Neural Network (ANN) and Wavelet Transformation (WT) into the problem of handwritten character recognition. The Design of a recognition system model that handle this problem based on applying Artificial Neural Network (ANN) of Kohenen ACON type. The feature extraction process made use of WT (the Haar Type). It’s used to extract the parametric features of the handwritten characters. The system was implemented using a database of 130 persons, 70 sample from the database were used for training, and the all 130 samples were used for testing the system. The efficiency of the system was tested using the Recognition Rate, and the results were promising.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133222015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiple Parameters Optimization for Cognitive Radio Environment Employing Cuckoo Search Algorithm 基于杜鹃搜索算法的认知无线电环境多参数优化
May Kamil Al-Azzawi, Haider S. Hatem, Mohammad Ibrahim Shujaa
{"title":"Multiple Parameters Optimization for Cognitive Radio Environment Employing Cuckoo Search Algorithm","authors":"May Kamil Al-Azzawi, Haider S. Hatem, Mohammad Ibrahim Shujaa","doi":"10.1109/NTCCIT.2018.8681189","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681189","url":null,"abstract":"A spectrum opportunity considers the most significant feature, wherever channel obtain ability has to be exceedingly taking into account in several routing train in cognitive radio network. A choice of a whole path, starting from source to specific destination, is likely to be completed one time if we have stationary topology in case of a primary user is inattentive for the whole message time. To effectively transmit data packets and to develop cognitive routing protocols and to enforce challenges as a result of the changing nature of the obtainable spectrum, this research proposes an optimization path routing algorithm depend on the basis of the one of inspired approaches (Cuckoo Search Algorithm) to speed up the exploration for the optimal routes. This algorithm is a new meta-heuristic algorithm. It is being used for solving optimization problem. This study presents an advanced routing algorithm specified for this networks, this algorithm is based on the cuckoo search algorithm, makes the transmission process effectual, adaptive in addition to scalable with a cumulative number of nodes. The new guideline proposed better satisfies the demands of Quality of Services (QoS) and show that the algorithm is valid and effective in controlling the packet loss ratio, time delay and the residual bandwidth while satisfying service requirements, emphasizing of some important characteristics of cuckoo search algorithm.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"42 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Analysis of High Performance and Miniaturized Bandpass filter using Meander Line and, Minkowski Fractal Geometry 基于弯曲线和闵可夫斯基分形几何的高性能小型化带通滤波器设计与分析
Abdullah A. Marzah, J. Aziz
{"title":"Design and Analysis of High Performance and Miniaturized Bandpass filter using Meander Line and, Minkowski Fractal Geometry","authors":"Abdullah A. Marzah, J. Aziz","doi":"10.1109/NTCCIT.2018.8681174","DOIUrl":"https://doi.org/10.1109/NTCCIT.2018.8681174","url":null,"abstract":"The band pass filter (BPF) is an important component that used in transmitter and receiver of a microwave communication system. The aim of this study is to design miniaturized BPF by fractal geometry techniques using microstrip structure. Meander line technique compound with Minkowski fractals was used for extra size reduction. The proposed BPF designed at center frequency 2.4 GHz which is used in industrial scientific medical (ISM) band applications with bandwidth 429 MHz (FBW=17.6%). The proposed filtering structure was designed using FR-4 substrate with 4.3 dielectric constant and 1.6mm thickness. The proposed filter demonstrates 1.6 dB insertion loss, 17 dB return loss, and size reduction about 74.5% as compared with conventional design. The overall dimensions of designed filter (14.18mm x 13.01mm) which equal to (0.2λgx0.18λg). CST microwave studio tools used in the design and simulation of the proposed BPFs.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134079620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信