{"title":"Ultra-Wideband Positioning System Using TWR and Lateration Methods","authors":"A. Duru, E. Sehirli, I. Kabalci","doi":"10.1145/3234698.3234756","DOIUrl":"https://doi.org/10.1145/3234698.3234756","url":null,"abstract":"Indoor wireless positioning systems enables location based applications to work properly inside buildings. Since GPS technology could not supply desired precision in indoor environment, there has been many positioning systems developed based on different technologies to solve localization problem. In this paper, indoor navigation system based on Ultra-Wideband technology has been proposed. Then, ranging model of the tracking system is established. Trilateration, Least Square Estimation and Centroid Method positioning algorithms are applied to provide a realistic comparison between them. Results are analyzed to compare the accuracy between different algorithms and the ideas are shared to improve the current study.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129298225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Study of Stimulated Brillouin Diffusion in Lasers High Power Photonic Crystal Fiber","authors":"A. Boulezhar, M. Abouricha, S. Amrane, N. Azami","doi":"10.1145/3234698.3234770","DOIUrl":"https://doi.org/10.1145/3234698.3234770","url":null,"abstract":"We present in this work the special structure of photonic crystal fiber (PCF), the temperature dependent Yb3+ photonic crystal fiber lasers model with stimulated Brillouin scattering (SBS) by solving the steady state rate equation with the SBS in the linear cavity. The numerical results show that the pump power, laser power and stokes powers propagating along axial positions are obtained by using the finite difference method and shooting method. The comparison results of the photonic crystal fiber laser model without temperature factor, the output powers and the SBS threshold powers in different pump schemes are obtained with the simulation. The numerical results show that the SBS threshold power in the two-end pump scheme is more noticeable than other pump schemes.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"69 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123153402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polypropylene material under simulated recycling: effect of degradation on mechanical, thermal and rheological properties","authors":"Z. Sadik, F. Arrakhiz, H. Idrissi-Saba","doi":"10.1145/3234698.3234736","DOIUrl":"https://doi.org/10.1145/3234698.3234736","url":null,"abstract":"Thinking on the environmental industry, and to encourage the use of recycled polymer as raw material, a study of the properties of several extrusion-injection cycles was investigated. Mechanical, thermal and structural properties of the samples were carried out in this paper using tensile test, thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), Fourier transform infrared spectroscopy (FT-IR) and viscosity analysis. The collected mechanical results as tensile strength, Young's modulus and torsional modulus had shown that they were not significantly affected by recycling process. Thus, a slight decrease from 1034 MPa of neat PP to 978 MPa for the 6th recycled PP in the Young's modulus and 30 MPa for PP tensile strength to 24 MPa for the 6th recycled PP tensile strength. The viscoelastic behavior of the recycled polymer has been evaluated though dynamic mechanical thermal analysis and results have shown that the viscoelastic behavior is closely related to the polymer chain length.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127772206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamza A. Elghadhafi, T. Abdelaziz, Abdelsalam M. Maatuk
{"title":"A Novel Approach for Improving the Quality of Software Code using Reverse Engineering","authors":"Hamza A. Elghadhafi, T. Abdelaziz, Abdelsalam M. Maatuk","doi":"10.1145/3234698.3234729","DOIUrl":"https://doi.org/10.1145/3234698.3234729","url":null,"abstract":"Copying and pasting program code fragments with minor changes is a common practice in software development. Software systems often have similar segments of code, called code clones. Due to many reasons, unintentional smells may also appear in the source code without awareness of program developers. Code smell may violate the principles of software design and negatively impact program design quality, thus making software development and maintenance very costly. This paper presents an enhanced approach to facilitate the process of identification and elimination of code smells. The proposed solution allows the detection and removal of code smells for refinement and improvement of the quality of software system. Code smells are analyzed, restructured and eliminated from the source code using reverse engineering techniques. The solution maintains the external behaviour of software system and judges the efficiency of systems code. An experiment has been conducted using a real software system, which is evaluated before and after using the approach. The results have been encouraging and help in detecting code smells.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predict the type of hearing aid of audiology patients using data mining techniques","authors":"S. Kurnaz, Maalim A. Aljabery","doi":"10.1145/3234698.3234755","DOIUrl":"https://doi.org/10.1145/3234698.3234755","url":null,"abstract":"Our research transacts with a great various audiology data from National Health System (NHS) facility, including audiograms, structured data such as age, gender, and diagnosis, and a text of specific information about each patient, i.e., clinical reports. This research examines factors related to audiology patients depends on various data by using the mining and analysis of this data. This paper looks for factors affecting the choice between two prevalent hearing aid kinds: BTE (Behind The Ear) or ITE (In The Ear). This choice often done by audiology technicians working in specific clinics for this purpose, based on audiograms results and patient consultation. In many situations, there is an obvious choice, but sometimes the technicians need for the second opinion via an automatic system includes clarification of how to obtain that second opinion. The research deals with diversified specifics and more significant factors for choosing of confirmed hearing aid related to those specifics. We depend on the earlier study data (Bareiss, E. Ray, & Porter, Bruce (1987)). Protos: An Exemplar-Based Learning Apprentice. In the Proceedings of the 4th International Workshop on Machine Learning, 12-23, Irvine, California, which illustrates the database analysis for 180,000 records, for 23,000 patients, by the hearing aid clinic at James Cook University Hospital in Middlesbrough, UK. This data mined to find which factors contribute to the deduction to fit a BTE hearing aid as opposed to an ITE hearing aid. Here we conduct some enhancements on this database and analyze the data depends on medical information to create a new class then we use some intelligent Data Mining (DM) techniques to guess the most correct illness that could be associated with patient's information. Based on the result (according to the patients' diagnosis details), we can obtain right predictions of which type of Hearing Aid (HA) they should use.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130241784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Achour, S. Amokrane, A. Azbouche, S. Chegrouche, H. Mekatel, A. Hadri, D. Nibou
{"title":"Bentonite Characterization by Nuclear Techniques for Environment Applications","authors":"S. Achour, S. Amokrane, A. Azbouche, S. Chegrouche, H. Mekatel, A. Hadri, D. Nibou","doi":"10.1145/3234698.3234717","DOIUrl":"https://doi.org/10.1145/3234698.3234717","url":null,"abstract":"Three bentonites samples from the M'Zila deposit, W. Mostaganem, Algeria, were characterized by the Instrumental Neutron Activation Analysis (INAA) and the X-ray fluorescence analysis (EDXRF) techniques which are two very sensitive, multi-elementary and precise nuclear analysis techniques, in particular the INAA technique which is well suited for the characterization of bentonites with a low detection limit. The characterization of these samples consists in determining their chemical compositions in major, minor and trace elements, in particular their rare earth element compositions (REEs), which are indicators of the presence of fissile elements such as uranium and thorium in order to valorize these materials subsequently to the treatment of radioactive waste. The samples were irradiated at the nuclear reactor under a neutron flux of 2.36 × 1013 cm-2s-1 for 4 hours and measured by gamma spectrometry, using a high resolution HPGe semiconductor detector (1.8 keV for the line 1332.5 keV of 60 Co).The spectra were analyzed using the gamma vision software dedicated to the treatment of gamma spectra. For a second analysis companion, the samples were excited with an X-ray beam of a current 20 μA, generated by a generator of RX with a voltage of 30KV and equipped with a silver anode. The spectra of the bentonite samples were obtained using a SDD type detector with a thickness of 7.62 μm and an active surface area of 25 mm 2, and its resolution is 135 eV for the line 5.9 keV of 55 Fe. The determination of the concentrations of trace elements and rare earths completed with very satisfactory and accurate results, allowed us to see the effect of the chemical changes made on our raw sample that will serve us for a reliable and logical interpretation of the results from the valorization of these materials to the treatment of radioactive waste.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hicham El Bousty, S. Krit, M. Elasikri, Hassan Dani, K. Karimi, K. Bendaoud, M. Kabrane
{"title":"Investigating Business Intelligence in the era of Big Data: concepts, benefits and challenges","authors":"Hicham El Bousty, S. Krit, M. Elasikri, Hassan Dani, K. Karimi, K. Bendaoud, M. Kabrane","doi":"10.1145/3234698.3234723","DOIUrl":"https://doi.org/10.1145/3234698.3234723","url":null,"abstract":"Business intelligence suppose retrieving value from data floating in the organization environment. It provides methods and tools for collecting, storing, formatting and analyzing data for the purpose of helping managers in decision-making. At the start, only data from enterprise internal activities were examined. Now and in this turbulent business environment, organizations should incorporate analysis of the huge amount of external data gathered from multifarious sources. It is argued that BI systems accuracy depends on quantity of data at their disposal, yet some storage and analysis methods are phased out and should be reviewed by academics and practitioners. This paper presents an overview of BI challenges in the context of Big Data (BD) and some available solutions provided, either by using Cloud Computing (CC) or improving Data Warehouse (DW) efficiency.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Benaddy, B. El Habil, Othmane El Meslouhi, S. Krit
{"title":"Recurrent neural network for software failure prediction","authors":"M. Benaddy, B. El Habil, Othmane El Meslouhi, S. Krit","doi":"10.1145/3234698.3234714","DOIUrl":"https://doi.org/10.1145/3234698.3234714","url":null,"abstract":"Software failure occurs when the software runs in an operational profile. Controlling failures in software require that one can predict problems early enough to take preventive action. The prediction of software failures is done by using the historical failures collected previously when they occur. To predict software failures, several models are proposed by researchers. In this paper, we present a recurrent neural network (RNN) to predict software failure using historical failure data. The proposed RNN is trained and tested using collected data from the literature; the obtained results are compared with other models and show that our proposed model gives very attractive prediction rates.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Radhakrishna, Shadi A. Aljawarneh, Aravind Cheruvu
{"title":"Sequential Approach for Mining of Temporal Itemsets","authors":"V. Radhakrishna, Shadi A. Aljawarneh, Aravind Cheruvu","doi":"10.1145/3234698.3234731","DOIUrl":"https://doi.org/10.1145/3234698.3234731","url":null,"abstract":"Sequential approach for mining temporal itemsets initially proposed by Yoo and Sekhar uses the Euclidean distance measure to discover similarity profiled temporal associations. This paper extends the sequential approach proposed by Yoo by applying the proposed dissimilarity function. The proposed dissimilarity measure for sequential method is obtained by extending the basic Gaussian membership function. Experiments are conducted by applying naïve and sequential approaches using Lp-norm distance function over synthetic dataset generated and results are compared to the sequential approach using proposed Gaussian based distance function. Naïve and sequential methods using Euclidean distance function and sequential approach using proposed distance function are compared w.r.t computational time and computational space. Experiment results using synthetic datasets proved that the performance of proposed approach is better to naïve and sequential approaches in terms of computational time.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Route Optimization in NEMO using ECC and Stream Cipher Cryptography","authors":"Vikram Raju R, U. Rawat, K. Garg","doi":"10.1145/3234698.3234739","DOIUrl":"https://doi.org/10.1145/3234698.3234739","url":null,"abstract":"Standard IP is not suitable for internet access in mobile devices because such devices are portable and IP address keeps on getting change in wireless networks. Mobile IP is introduced to provide internet in mobile devices (i.e host mobility). There can be situation, where group of nodes (Mobile Nodes) moves from one network to another network range while accessing internet as network mobility (i.e Network Mobility (NEMO)). In NEMO, there will be gateway called Mobile Router (MR) and provides internet to all MNs and takes care about handoff for all mobile nodes. Whenever NEMO moves from home network to foreign network, it gets new address from visiting network and it has to update Home Agent (HA) regarding its address change. MR intimate about its address changes to HA through Binding Update (BU) and HA sends Binding Acknowledgement (BA) to MR as response. Various security threats arise during messages exchange and during registration between MN, MN, HA and between MN, CN (route optimization path). In this paper, we proposed security method for providing secure Route Optimization (RO) and communication between MN, MR and HA using ECC with stream cipher cryptography. The solution is simulated in NS2 and proved that our solution can protect from all standard attacks using security analysis. Comparision is done with standard Return Routability Procedure (RRP).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}