4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)最新文献

筛选
英文 中文
Quantifying the effect of the Temperature Variable on Optical Anisotropy of Line Spread Function at Image plane 量化温度变量对像平面线扩展函数光学各向异性的影响
Abdulrazak A. Mohammed, S. M. Hameed, ADlL H. Mohammed
{"title":"Quantifying the effect of the Temperature Variable on Optical Anisotropy of Line Spread Function at Image plane","authors":"Abdulrazak A. Mohammed, S. M. Hameed, ADlL H. Mohammed","doi":"10.24086/cocos2022/paper.471","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.471","url":null,"abstract":"It is well known that the variable of temperature degree will effect on the characteristics of any optical component especial lenses and mirrors, because this thermal variable will affect on thermal expansion of the optical component material, we can say (refractive index (n) of the material), Of course this effect will transfer to the ray tracing throw the optical components and which effect on the properties of the spot diagram of image forming. (Even the temperature is increasing or decreasing). When the rays intersect with the image plane, there will be a spot (the spot is intersected between two or more rays that intersect the image plane), the spot distribution will represent the image of the object. This is called a spot diagram. The spot diagram has an important property which are the sizes of spots and type of distribution. So, the thermal effect will appear in these properties of the spot diagram. The main properties of the lens that been affected by thermal is curvature of the surface (R), thickness, object and image planes position (the distances of object & image from the lens center, (S ,S’) are variables will make changing in the values of focal length of the lens (that means defocus) appear","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol 基本自动重复请求协议和混合自动重复请求协议的性能分析
{"title":"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol","authors":"","doi":"10.24086/cocos2022/paper.567","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.567","url":null,"abstract":"The size of network and internet traffic is rising spontaneously by the day, with data usage at zettabyte to petabyte scale at an exponential high rate and therefore considered to generate huge traffic along the way which causes the chance of error in transmission to be high as well. Automatic Repeat Request (ARQ) protocol is an error control function for data transmission that uses acknowledgements. These protocols exist in Data link or Transport layers. ARQ is categorize into three major types such as Stop and wait, Go Bank N and Selective Repeat. Hybrid automatic repeat (HARQ) request which is an advancement to earlier mentioned protocols to detect error via cycle redundancy check was later developed. This paper evaluates the performance of these basic ARQs and HARQ protocols in consideration of the current state of high signal interference and collision during competitive accesses, more especially in highly densely networks.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"929 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123295218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A perspective on the Development of Quantum Computers and the Security challenges 量子计算机的发展与安全挑战展望
Abdullah A. Nahi, Laith R. Flaih, Khalid F. Jasim
{"title":"A perspective on the Development of Quantum Computers and the Security challenges","authors":"Abdullah A. Nahi, Laith R. Flaih, Khalid F. Jasim","doi":"10.24086/cocos2022/paper.754","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.754","url":null,"abstract":"The amount of data produced and processed every day is increasing exponentially, and reaching unthinkable levels. This amount of data has to be stored and processed by something. While the conventional computers are reaching their limits in data storage and processing, and this dictates the need for a nano sized transistors.Quantum computers can provide genius solution for that issue. Quantum computing is an emerging interdisciplinary field in information technology. This technology acquired its name, because it is based on quantum physics. In this article we present a new perspectiveonthe progress in the research efforts on quantum computing technology and their likelihood to replace the conventional computers and change the way we manipulate data and information. Also we claim this might be the first article in the region tackling quantum technology.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic prediction of geological status of tunnel route using the Markov method 基于马尔可夫方法的隧道路线地质状况概率预测
A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, ,. H. Hashim Ibrahim
{"title":"Probabilistic prediction of geological status of tunnel route using the Markov method","authors":"A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama Ali, ,. H. Hashim Ibrahim","doi":"10.24086/cocos2022/paper.664","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.664","url":null,"abstract":"Minimizing the uncertainties related to the tunnels’ construction parameters is a crucial task that need to be addressed. Usually, the most uncertainties in underground structures are related to the unknown geological status. In order to probabilistically estimate these uncertainties, variety techniques have been developed, including the Markov method. This study is undertaken on a road tunnel in Iran in order to forecasting the geological status along its route using the Markov method. To access the Markov’s model input data, a number of questionnaires were distributed among the tunneling experts and eventually the mean values of the respondents were used in the model. In the next step, the results predicted by the Markov model were compared with the actual ones to evaluate the model performance. Finally, the Markov model was suggested as a powerful tool to predict tunnels’ path geology.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125269262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems Governance and Green Information Technologies 信息系统治理与绿色信息技术
Laith R. Flaih
{"title":"Information Systems Governance and Green Information Technologies","authors":"Laith R. Flaih","doi":"10.24086/cocos2022/paper.516","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.516","url":null,"abstract":"Information systems governance and green information technology are included in this review. More precisely, organizational activities. Every day, an increasing amount of organizations around the world adopt modern Green IT activities. However, though, it has little to do with corporate management and governance. A new structure for implementing Green IT governance is needed for this. Concerning these elements, Environmental sensitivity trends are pushing companies to take a new solution to this issue. Implementing green strategies has been a challenge for organizations that wish to remain ahead of the curve regarding social and environmental consciousness. The field of information technology, rather than any other, has proved to be a valuable tool and future friend of the environment (IT). Green IT and governance IT conducts in this region promote sustainability in and by IT. Organizations, however - owing to a lack of clear green IT principles and practices, helping them to perform some sustainable action - are at a major disadvantage in this respect. This research aims to show the researchers' findings of the value of Green IT and governance information systems in industry and organizations and the benefits of using them. The findings of this multi-count analysis illustrate the present state of Green IT organizations, their IT method of government, and problem-solving in a particular situation in their researchers.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116963691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-Reassigned Synchrosqueezing Transform and low-frequency shadows associated with gas detection. 与气体检测相关的时间重分配同步压缩变换和低频阴影。
R. Anvari, Adil Hussein Mohammed, S. Rashidi
{"title":"Time-Reassigned Synchrosqueezing Transform and low-frequency shadows associated with gas detection.","authors":"R. Anvari, Adil Hussein Mohammed, S. Rashidi","doi":"10.24086/cocos2022/paper.767","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.767","url":null,"abstract":"Time-frequency representation, which has been widely used in seismic data inquiry, can reveal a parcel of useful data hidden inside the seismic data. We've introduced a previously unexplored seismic application of the high-resolution Time-Reassigned Synchrosqueezing Transform (TRSST), which can provide significantly sparser time-frequency representation than other methods. One of the most appealing aspects of the proposed technique is its ability to be entirely adaptable. For the flag examination representation and deterioration, various approaches have been presented. This paper used the TRSST to provide the time-frequency contour and stimulate the depiction of low-frequency shadows associated with hydrocarbons. It was also compared to the Short Time Fourier Transform (STFT), both of which are STFT-based time-frequency transforms.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134476480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing the Effective of Laser Spot Size on the Blood Clot 激光光斑大小对血凝块的影响分析
Abdulrazak Abdulsalam, Riyadh Mirza, Third C. Author
{"title":"Analyzing the Effective of Laser Spot Size on the Blood Clot","authors":"Abdulrazak Abdulsalam, Riyadh Mirza, Third C. Author","doi":"10.24086/cocos2022/paper.546","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.546","url":null,"abstract":"Blood clot is one of the series deceases for human body now a days. There are many types of blood clot depend on the location and type of the tissue. Blood clot causes when the blood flows into vessel and contact with specific material with the vessel wall. Lasers use in treatment of blood clots. The treatment of the blood clot is dependent on the type and the properties of used laser. One of the important proper of the laser is its spot size. Size of the blood clot and the laser beam have been analyzed. From the results we got the factor that gives a rescannable treatment.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Tracking System by Using GPS, GSM, and Arduino Technology 基于GPS、GSM和Arduino技术的车辆跟踪系统
Firas Zeki Mahmood
{"title":"Vehicle Tracking System by Using GPS, GSM, and Arduino Technology","authors":"Firas Zeki Mahmood","doi":"10.24086/cocos2022/paper.833","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.833","url":null,"abstract":"The fleet system uses a very well-established technology called the vehicle tracking system, the fleet system is the owner of the automobile and vehicle movement of goods around the globe, this technology is very reliable and safe. There’s a proposition of a real-time tracking system in this paper and it’s going to create a system that can be used for positioning and tracking of any vehicle by using Global System for Mobile communication and Satellite navigation system (Global positioning system). This system is designed as an application and will continuously indicate the status of the vehicle by monitoring its movement on demand. The device used for tracking to know the vehicle’s location in real-time is made up of the SIM900A module, Arduino Uno R3, and NEO 6M GPS module. For accomplishing this the Arduino Uno R3 has to be serially interfaced with the GPS and GSM modules. For reporting the location of the vehicle continuously from a remote place the GSM module is used, while the other GPS module is continuously updating the Arduino of data such as latitude, speed, longitude, and distance traveled by using the satellite. For viewing the position of the vehicle on the map Google Map is used. By using the application the user can send a message of a number that is registered on the GSM that’s attached to the Arduino, by doing this. The user will be able to receive information like longitude, google map lining of the vehicle, and latitude by a text message. This proposal contains vehicle security, salesman tracking, and private drivers.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation framework to measure the effect of applying smart house on the power consumption 模拟框架来衡量应用智能住宅对电力消耗的影响
Ahmad Nashwan Abdulfattah, Abdullah A. Nahi, Yazen Saif Almashhadani
{"title":"Simulation framework to measure the effect of applying smart house on the power consumption","authors":"Ahmad Nashwan Abdulfattah, Abdullah A. Nahi, Yazen Saif Almashhadani","doi":"10.24086/cocos2022/paper.780","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.780","url":null,"abstract":"Distribution network operators are becoming increasingly interested in accurately anticipating load characteristics at the low voltage level. Energy disaggregation could be one of the potential approaches to exploit the massive amount of smart meter data to fulfill the task. Proper individual home appliance modelling is critical to the performance of NILM. In this paper, a hierarchical hidden Markov model (HHMM) framework to model home appliances is proposed. This model aims to provide better representation for those appliances that have multiple built-in modes with distinct power consumption profiles, such as washing machines and dishwashers. The dynamic Bayesian network representation of such an appliance model is built. A forward backward algorithm, which is based on the framework of expectation maximization (EM), is formalized for the HHMM fitting process. Tests on publicly available data show that the HHMM and proposed algorithm can effectively handle the modelling of appliances with multiple functional modes, as well as better representing a general type of appliances. A disaggregation test also demonstrates that the fitted HHMM can be easily applied to a general inference solver to outperform conventional hidden Markov model in the estimation of energy disaggregation.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117253829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS THE SECURITY OF SOME CIPHERS IN INDUSTRIAL APPLICATIONS OF WIRELESS SENSORS NETWORKS 分析了无线传感器网络工业应用中几种密码的安全性
Khalid Fadhil Jasim, Mohammad Hussein Shukur, Abdullah Abdulabbas Nahi Alrabeeah, Laith R. Fleih
{"title":"ANALYSIS THE SECURITY OF SOME CIPHERS IN INDUSTRIAL APPLICATIONS OF WIRELESS SENSORS NETWORKS","authors":"Khalid Fadhil Jasim, Mohammad Hussein Shukur, Abdullah Abdulabbas Nahi Alrabeeah, Laith R. Fleih","doi":"10.24086/cocos2022/paper.513","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.513","url":null,"abstract":"The wireless sensor networks played substantial role in many fields such as pollution monitoring system, health care system, military operations system, agriculture industries, bridges monitoring, and wastewater treatment systems. Various types of data are exchanged via these networks which can be exploited by intruders or unauthorized users. Hence, there is a demand to protect the data confidentiality in these networks. The cipher algorithms can be used to protect the data confidentiality in these networks. This research presents some applications of wireless networks. Moreover, the research focused on study some cipher algorithms and different features of these ciphers. In this context, the encryption keys, input block, encryption process, and components of these algorithms have been covered. Thus, these cipher algorithms can provide suitable level of protection for the WSN networks.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信