2019 14th International Conference on Computer Engineering and Systems (ICCES)最新文献

筛选
英文 中文
States and Power Consumption Estimation for NILM NILM的状态和功耗估计
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068152
Neveen M. Hussein, A. Hesham, Mohsen A. Rashawn
{"title":"States and Power Consumption Estimation for NILM","authors":"Neveen M. Hussein, A. Hesham, Mohsen A. Rashawn","doi":"10.1109/ICCES48960.2019.9068152","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068152","url":null,"abstract":"This paper presents Nonintrusive Load Monitoring (NILM) for electrical home appliances network which consists of a known set of devices. Hidden Markov Model (HMM) is used for system modeling. The proposed method enhances determining and defining all states for each device. First we classify each device states into a set of states not only the ON and OFF states in the form of variations in its active power ranges. AMPDS collected dataset is used in training and testing for six selected home devices in a certain household and is also compared to GREEND dataset showing the advantage of the variable observed power readings with those of constant power readings. Each device has different number of states. Then the proposed mechanism is used to minimize these states after understanding the behavior of each state into OFF and ON states only. This method provides high accuracy on the system level, the device level, state inference, power and state sequence estimation.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128064807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System 基于增强机器学习的威胁猎人智能网络入侵检测系统
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068160
Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin
{"title":"An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System","authors":"Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES48960.2019.9068160","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068160","url":null,"abstract":"In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer 基于并发多径传输的视频传输调度框架
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068150
Hatem Fetoh, Ahmad M. Hamad, K. M. Amin
{"title":"A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer","authors":"Hatem Fetoh, Ahmad M. Hamad, K. M. Amin","doi":"10.1109/ICCES48960.2019.9068150","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068150","url":null,"abstract":"Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Blockchain Applications in IoT Systems 区块链在物联网系统中的应用综述
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068170
Diaa A. Noby, Ahmed K. F. Khattab
{"title":"A Survey of Blockchain Applications in IoT Systems","authors":"Diaa A. Noby, Ahmed K. F. Khattab","doi":"10.1109/ICCES48960.2019.9068170","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068170","url":null,"abstract":"This paper presents an extensive study of the different ways the Internet of Things (IoT) applications exploit the recently developed blockchain technology. Even though the blockchain technology was originally presented as a security mechanism, its numerous benefits such as decentralization, immutability, persistence, anonymity and auditability can be used by IoT systems in different ways. More specifically, we classify the ways IoT systems exploit blockchain into three categories: resource management, decentralized information sharing, and IoT security. The comprehensive study of the applications of the blockchain technology in the different IoT domains presented in this paper sheds the light on the future research directions in the integration of the two technologies.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation of a Multistage Image Compression and Reconstruction System Based on the Orthogonal Matching Pursuit Using FPGA 基于正交匹配追踪的多级图像压缩与重构系统的FPGA设计与实现
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068151
Mohamed M. Ahmed, Hassan Bedour, S. M. Hassan
{"title":"Design and Implementation of a Multistage Image Compression and Reconstruction System Based on the Orthogonal Matching Pursuit Using FPGA","authors":"Mohamed M. Ahmed, Hassan Bedour, S. M. Hassan","doi":"10.1109/ICCES48960.2019.9068151","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068151","url":null,"abstract":"Due to the vast developments in the media communication field and the quality of the visual imaging, image data compression has been one of the most interesting field. The main purpose of the image compression is to produce a very low bit rate while achieving a high quality of the reconstructed images. Image compression are used for all fields of media communication such as medical image recognition, multimedia, digital image processing. There are different algorithms for compression and reconstruction. One of these methods is the Orthogonal Matching Pursuit that is used mainly in the reconstruction of the radar signal. This paper discloses a new methodology for image compression and reconstruction to enhance the performance while at the same time reducing the bit data size. This kind of reconstruction algorithm is based upon multistage compression and OMP reconstruction. The Matlab Simulation and the FPGA implementation will be provided in this paper to validate the concept of this paper.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incipient Fault Detection of Electric Power Transformers Using Fuzzy Logic Based on Roger's and IEC Method 基于罗杰和IEC方法的模糊逻辑电力变压器早期故障检测
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068132
Fatma Mohamad, Khaled Hosny, T. Barakat
{"title":"Incipient Fault Detection of Electric Power Transformers Using Fuzzy Logic Based on Roger's and IEC Method","authors":"Fatma Mohamad, Khaled Hosny, T. Barakat","doi":"10.1109/ICCES48960.2019.9068132","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068132","url":null,"abstract":"Power transformer is an essential part in any power plant, so continuous check of its reliability should be kept up. Dissolved Gas Analysis (DGA) is one of the most important techniques for detecting incipient faults of transformer that immersed in insulation oil. Some widely used conventional techniques based on DGA such as Roger's and IEC methods were developed to diagnose faults of power transformers. These methods succeeded noticeably to detect transformer's faults. However, they fail to detect the fault type if the measured ratios of gases slightly deviated from the crisp boundaries of ranges assigned by these methods. An Artificial Intelligent technique based method called fuzzy logic approach, which is the field of study in this paper is used to overcome the above mentioned drawback by fuzzifying the boundaries of ranges defined by these techniques. This paper presents a comparison between the results of conventional Roger's, IEC methods and the proposed fuzzy logic.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings ICCES 2019 14th International Conference on Computer Engineering and Systems (ICCES) 第14届计算机工程与系统国际会议(ICCES)
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/icces48960.2019.9068127
Ashraf Salem, H. Abbas, M. El-Kharashi, Ayman M. Bahaa El-Din, Mohamad Taher
{"title":"Proceedings ICCES 2019 14th International Conference on Computer Engineering and Systems (ICCES)","authors":"Ashraf Salem, H. Abbas, M. El-Kharashi, Ayman M. Bahaa El-Din, Mohamad Taher","doi":"10.1109/icces48960.2019.9068127","DOIUrl":"https://doi.org/10.1109/icces48960.2019.9068127","url":null,"abstract":"","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Cost Traffic Control using Reinforcement Learning 基于强化学习的低成本交通控制
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068125
Ahmed F. AbouElhamayed, Hani M. K. Mahdi, Cherif R. Salama
{"title":"Low-Cost Traffic Control using Reinforcement Learning","authors":"Ahmed F. AbouElhamayed, Hani M. K. Mahdi, Cherif R. Salama","doi":"10.1109/ICCES48960.2019.9068125","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068125","url":null,"abstract":"Solving the traffic congestion problem has many benefits financially and environmentally. The application of Artificial Intelligence to solving the traffic congestion problem has been going on for a while. However, most of the current research in this area depends on knowing lots of information about all vehicles in the network. While it produces promising results, applying these techniques in the current world is not easy. In this paper, we apply reinforcement learning to the field of traffic control under the assumption that only minimal information is available. Our approach produces results that are better than currently deployed fixed-time traffic lights without having heavy requirements. In our first test configuration, our agent's waiting time is 82.3% of the best fixed-time traffic lights' waiting time and the average CO2 emissions produced by our agent is 97.5% of the emissions produced by the best fixed-time traffic lights. This shows the potential of applying reinforcement learning to the traffic control problem with limited state.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Architectures for Abstractive Text Summarization in Multiple Languages 多语言抽象文本摘要的深度体系结构
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068171
Amr M. Zaki, M. Khalil, Hazem M. Abbas
{"title":"Deep Architectures for Abstractive Text Summarization in Multiple Languages","authors":"Amr M. Zaki, M. Khalil, Hazem M. Abbas","doi":"10.1109/ICCES48960.2019.9068171","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068171","url":null,"abstract":"Abstractive text summarization is the task of generating a novel summary given an article, not by merely extracting and selecting text to produce a summary, but by actually creating and understating the given text to produce a summary. LSTM seq2seq encoder-decoder with attention models have proved successful in this task, but they suffer from some problems. In this work, we would go through multiple models to try and solve these problems, beginning with simple seq2seq with attention models to going to Pointer-Generator, to using a curriculum learning approach called Scheduled-Sampling, till we reach the new approaches of combining reinforcement learning with seq2seq. We have applied these models on multiple datasets for multiple languages, English and Arabic. We have also introduced a new novel method of working with agglutinative languages, it is a preprocessing technique that is applied to the dataset which increases the relevancy of the vocabulary, which effectively increases the efficiency of the text summarization without modifying the models, we call this technique advanced cleaning, we have applied it to the Arabic dataset, and it can then be applied to any other agglutinative language. We have built these models in Jupiter notebooks to run seamlessly on Google colaboratory.11https://medium.com/@theamrzaki22https://github.com/theamrzaki/text_summurization_abstractive_methods","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131546681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and Implementation of Robust Firefighting/Intruder Detection System Using Fuzzy Logic Decision Control (FIDFUZ) 基于模糊决策控制(FIDFUZ)的鲁棒消防/入侵检测系统设计与实现
2019 14th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068159
Marianne A. Azer, A. Elshafee
{"title":"Design and Implementation of Robust Firefighting/Intruder Detection System Using Fuzzy Logic Decision Control (FIDFUZ)","authors":"Marianne A. Azer, A. Elshafee","doi":"10.1109/ICCES48960.2019.9068159","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068159","url":null,"abstract":"This research focuses on using quantifiable methods for using the IoT as a main support to firefighting/intruder detection. From our research, we have found numerous researches associated to supplying remote services by means of portable sensors and communication technologies. We represent in our research a unique Smart Firefighting/lntruder Detection System with the support of Fuzzy Logic Decision Control (FIDFUZ). The projected system has an innovative value which is the Fuzzy Logic Decision Support System application that deals with the predicted inaccuracy and the doubt in the sensor's information acquired, as well as minimizing the rate of false positive and true negative. FIDFUZ full architecture is presented, applied and checked by simulation and using real data.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信