Ahmad H. Al-Sharif, Khaled Y. Youssef, K. MansourHalaA.
{"title":"Performance Analysis of Selective Authentication Schemes for IPTV Networks","authors":"Ahmad H. Al-Sharif, Khaled Y. Youssef, K. MansourHalaA.","doi":"10.1109/ICCTA35431.2014.9521611","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521611","url":null,"abstract":"The growing demand on IPTV as well as the strong adoption of smart devices as tablets and smartphones in presence of broadband wireless technologies as LTE, leads to increasing challenges on the need to authenticate media content to be delivered specially over wireless networks. In this paper, we focus on security areas in IPTV networks specially authentication schemes. In general, a short survey is held for IPTV authentication schemes versus challenges of transmission media. In addition, mathematical modelling is held for seven authentication schemes and their respective performance impact against referential metrics including processing capabilities and existing algorithms limitations. Moreover, comparisons are done among the considered schemes in light of four performance metrics namely computational cost, communication overhead, receiver butter size, and authentication delay.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134240610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Cryptographic Algorithm : Variable Key Length Encryption Algorithm (VEA)","authors":"Bassam W. Aboshosha, R. Ramdan, A. Wahdan","doi":"10.1109/ICCTA35431.2014.9521620","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521620","url":null,"abstract":"Wireless networks applications are growing very fast although their nodes suffer from limited bandwidth, memory, and processing capabilities. They operate on unattended mode in hostile environments and the sensitive data should be protected using some sort of cryptography. Due to the limited computing power of wireless devices, it is impossible to use asymmetric cryptography approaches for the session key establishment or to apply one of the traditional advanced encryption algorithms for the data encryption. Therefore, VEA is proposed in this paper as an appropriate cryptography algorithm for wireless networks due to its low energy consumption, simple hardware requirements and suitable level of security. In addition, the algorithm has an important advantage over the current cryptography algorithm in which variable key length can be used. VEA tries to overcome the limitations of both public- and symmetric-key protocols. VEA relies its design on a smart version of Feistel structure.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Look-ahead Controllers for Nonholonomic Mobile Robot Manipulator","authors":"A. F. Amer, E. Sallam, I. Sultan","doi":"10.1109/ICCTA35431.2014.9521617","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521617","url":null,"abstract":"This paper presents a planning and control algorithm for nonholonomic mobile robots (NMRs). The proposed controller uses the Look-ahead method that is based on feedback linearization technique; the linearization is achieved between the control inputs and the appropriate outputs. Hence the system can be decoupled. The controlled system consists of manipulator mounted on a mobile platform. The end-point of the manipulator is guided. It is desirable that the mobile platform is able to move as to position the manipulator in certain preferred configurations. Since the motion of the manipulator is unknown a priori, the platform has to use the manipulator position for motion planning. The simulations were carried with four techniques, self-tuning fuzzy PD (STFPD) controller, self-tuning neuro-fuzzy PD (STNFPD) controller, optimized PD (OPD), and PID (OPID) controllers with genetic algorithm (GA). The simulations comparison is carried out with the MATLAB/Simulink. Simulation results are presented to illustrate the efficacy of the proposed algorithm.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116097255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Inductor Class-D Audio Amplifier Modeling & Simulation","authors":"Abdelrahman Shalaby, M. Orabi, E. Hasaneen","doi":"10.1109/ICCTA35431.2014.9521612","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521612","url":null,"abstract":"during the last few years, there has been a growing market demand for audio amplifiers with a high output power and a large number of channels. This requires integrated audio amplifiers with a small number of external components and low power dissipation. Traditional class AB (linear) amplifiers, which are still largely used, are not suited to meet these demands. In addition, recent demand for smaller devices with longer battery life has confirmed the replacement of class AB with class D (switching amplifiers). Class D amplifiers provide the balance between efficiency and distortion required by portable devices and audio systems, as they utilize the switching operation where the transistors are either fully on or fully off resulting in amplification with zero power dissipation ideally. One possible drawback to the switching topology of the Class D amplifier is its tendency to emit electromagnetic radiation that can potentially interfere with other nearby electronic devices. External passive filtering can moderate this interference, but it adds area and complexity to the end product. This paper presents integrated inductor approaches that provide saving in area and ease of design. In addition, shielding and compact construction of the proposed integrated inductor reduces the conducted and radiated noise that can couple into the traces of the printed circuit board.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123043168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power System Disturbance Suppression Using Interval Type-2 Fuzzy Logic Stabilizer","authors":"O. Gouda, G. Amer, O. M. Salim, M. Hassan","doi":"10.1109/ICCTA35431.2014.9521627","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521627","url":null,"abstract":"Low frequency oscillations (LFOs) have a dramatic effect on small signal stability of a power system. As power system started to operate near its stability limits, LFOs might lead to system instability. Power system stabilizers (PSSs) are provided with automatic voltage regulator to damp such effects. In this paper, an interval type-2 fuzzy logic power system stabilizer (IT2FLPSS) is proposed as a stability enhancements of a single machine power system connected to the infinite bus. In addition, a conventional power system stabilizer (CPSS) has been introduced, both CPSS and IT2FLPSS results’ were compared at different disturbance scenarios to show the improvements added to the system when using IT2FLPSS. MATLAB/SIMULINK programs are proposed to illustrate system performance at all proposed scenarios.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128929310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring Organizations’ readiness for Customer Relationship Management (CRM): A Comparative Study","authors":"Mennatallah Ammar, E. Kosba, K. Mahar","doi":"10.1109/ICCTA35431.2014.9521648","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521648","url":null,"abstract":"Since 1990, Customer relationship management (CRM) has become an important subject for many organizations in different industries. CRM is a business strategy that offers benefit to both the customer and the organization. Organizations are applying CRM to manage their customers’ relationships, past sales, current purchases and inquiries. CRM implementation accompanies many uncertainties and risks; failure may lead to enormous losses. Many failures took place because the firm wasn’t ready for the implementation process. This paper compares the factors that were discussed in previous studies to extract the most critical factors that need to be evaluated before implementing CRM.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Hamed, Ayman E. Taha, Ahmed Imad Hammoodi Al-Jarah
{"title":"An Advanced Data Security Algorithm Using cryptography and DNA-Based steganography","authors":"E. Hamed, Ayman E. Taha, Ahmed Imad Hammoodi Al-Jarah","doi":"10.1109/ICCTA35431.2014.9521623","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521623","url":null,"abstract":"nowadays, data security has become one of the most important branches of computer sciences because of the great development in the Internet field and the great need to exchange information over the Internet. Cryptography is to protect the content of messages. The main problem in cryptography is that the data is not hidden. Although the data cannot be read, but it still exists so, someone can decrypt it. Steganography is about concealing the data existence. In this paper a new approach is introduced to ensure the secrecy and integrity of data transported over computer networks. The paper describes how cryptography and steganography were combined to produce higher level of security. Advanced Encryption Standard (AES) is used to encrypt data and a steganography technique is used to insert encrypted data in the deoxyribonucleic acid (DNA) sequence and then apply the central dogma of the molecular biology processes which converts DNA form to ribonucleic Acid (RNA) form then to protein form. The proposed technique was applied successfully.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Genetic Algorithm to Improve the Performance of Sigma-Delta Converter Used on Earthquake Monitoring Systems","authors":"O. Mohamed, R. Abdelrassoul, M. Mohanna, H. Nofal","doi":"10.1109/ICCTA35431.2014.9521624","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521624","url":null,"abstract":"An earthquake monitoring system consists of many electronic devices, one of this vital device is the digitizer which converts the analogue signal coming from the seismometer (sensor) to digital signal. The Digitizer consists of three main modules, the first module is front-end, the second module is the analog to digital converter using the oversampling technique with the decimation filter, finally the packetization module. This paper will focus on improving the performance of Sigma-delta converter which is used in the digitizer. Genetic algorithm will find the optimum coefficients value of cascaded integrators with distributed feedback Sigma-delta to maximize the signal to noise ratio and the effective number of bits. In addition, this paper will include the steps of choosing the best oversampling ratio and the best order of Sigma-delta. The final design will be implemented on an FPGA kit. As a result of this paper the third order sigma-delta is selected, and in addition, the signal to noise ratio and the effective number of bits are improved to 156 dB, 25.63 bits respectively. The operating frequency of the selected order sigma-delta is 125. 412MHz on FPGA kit.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"281 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracing Origins Of Unknown DNA/Protein Offspring Sequences On Multi-Processors","authors":"Mohamed Issa, A. Alzohairy","doi":"10.1109/ICCTA35431.2014.9521643","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521643","url":null,"abstract":"One of the main problems for an evolutionary biologist is tracing the modifications of ancestors in offspring sequences. The Gene Tracer application was developed for this function based on a local sequence alignment algorithm. It takes two ancestors and one offspring sequence as inputs and locates the similar regions between offspring and each ancestor. In this paper, Gene Tracer is further developed to find the origin of an unknown offspring sequence from a biological databases based on pairwise local alignment. In addition, the developed application is sped up by parallelizing the code on multiprocessors architecture.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heba Abdu Al Aziz, S. Elkaffas, S. Hassan, Ali Amasha
{"title":"GIS-Based Decision Support System Using Analytical Hierarchy Process for Solar Cells Site Selection in Sinai Peninsula, Egypt","authors":"Heba Abdu Al Aziz, S. Elkaffas, S. Hassan, Ali Amasha","doi":"10.1109/ICCTA35431.2014.9521616","DOIUrl":"https://doi.org/10.1109/ICCTA35431.2014.9521616","url":null,"abstract":"During the few recent decades, the demand for solar energy has increased and has been widely implemented around the world to replace the conventional non-renewable energy. One of the most challenging problems with the solar energy is the location suitability analysis to find where solar cells should be placed to maximize cells performance. This paper aims at developing a GIS-based Decision Support System (DSS) to locate ground-mounted solar cells installation sites in Sinai Peninsula, Egypt. The installation sites are determined using a Multi-Criteria Analysis (MCA) approach that considers various environmental and socio-economic factors. The DSS will identify suitable sites providing information on a multi-criteria level evaluation of locating solar cells. The Analytical Hierarchy Process (AHP) procedure, through ArcGIS Desktop 10, is used to calculate the multi-criteria weights. Eight criteria have been considered in this analysis such as sunshine, aspect, slope, temperature, pressure, humidity, lithology and wind speed. This study proves how GIS can be effectively used to spatially reconcile a selected prospect facility locations in a given region based on pre-existing geographic constraints. The results show that the most suitable areas for the solar cells installation projects cover about 24% of the area of Sinai and are mostly located at the Northern and the North-Western regions of Sinai based on the used criteria and the coarse scale.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}