2017 12th International Conference on Computer Engineering and Systems (ICCES)最新文献

筛选
英文 中文
Towards an automated approach for health status evaluation of patients with Juvenile Idiopathic Arthritis 对青少年特发性关节炎患者健康状况评估的自动化方法
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275366
Amr M. T. Ali-Eldin, E. Hafez, R. Helal
{"title":"Towards an automated approach for health status evaluation of patients with Juvenile Idiopathic Arthritis","authors":"Amr M. T. Ali-Eldin, E. Hafez, R. Helal","doi":"10.1109/ICCES.2017.8275366","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275366","url":null,"abstract":"Juvenile Idiopathic Arthritis (JIA) is a chronic inflammatory rheumatic disease that leads to disabled children with deformed joints and chronic pains. Since, the use of the traditional scores that evaluate quality of life of JIA patients are time consuming and usually not either accurate nor easy to apply, there is a great need to generate a new, easy and effective way to evaluate the health status scores autonomously. In this study, an automated approach is proposed for modelling the relationship between health status of patients with JIA and a number of influencing factors using Neuro-fuzzy algorithms. The approach was applied on data collected from 128 patients with JIA. The proposed model was verified using statistical analysis. Further, results obtained from the Neuro-fuzzy system were found very promising.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Parallel Genetic Algorithm and Q-learning for QoS-aware Web Service Composition 基于并行遗传算法和q学习的qos感知Web服务组合
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275307
D. Elsayed, M. Gheith, Eman S. Nasr, A. Ghazali
{"title":"Integration of Parallel Genetic Algorithm and Q-learning for QoS-aware Web Service Composition","authors":"D. Elsayed, M. Gheith, Eman S. Nasr, A. Ghazali","doi":"10.1109/ICCES.2017.8275307","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275307","url":null,"abstract":"Web Service Composition (WSC) is the process of reusing atomic Web services and combining them together to satisfy users' requirements. The main objective of WSC is to develop composite services to satisfy the Functional Requirements (FR), as well as optimizing the Quality of Services (QoS) requirements. This has led to the emergence of QoS-aware WSC. Due to the increase in number of Web services with the same functionality but various QoS, it became difficult to find the optimal solution in QoS-aware WSC in a given time frame. In this paper we propose a new approach that integrates the use of the Parallel Genetic Algorithm (PGA) and Q-learning to find the optimal WSC within reasonable time. Q-learning is used to generate the initial population to enhance the effectiveness of PGA. PGA is utilized to make the algorithm as time efficient as possible. We implemented our approach over .NET Framework platform 4.7 using C# programming language. The experiment results show the effectiveness of our proposed approach compared to PGA or GA only.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Remotely configurable fault-tolerant FPGA-based pacemaker 基于fpga的远程可配置容错起搏器
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275270
G. Alkady, H. Amer, R. Daoud
{"title":"Remotely configurable fault-tolerant FPGA-based pacemaker","authors":"G. Alkady, H. Amer, R. Daoud","doi":"10.1109/ICCES.2017.8275270","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275270","url":null,"abstract":"The Pacemaker is the most famous Implantable Medical Devices which is used in treating bradycardia and tachycardia. The pulse generator is the brain of the pacemaker; accordingly, it should be implemented using a powerful flexible platform. In this paper, an FPGA-based pulse generator is implemented. The Dynamic Partial Reconfiguration (DPR) property of FPGAs is used to allow the remote change of the operational mode of the pacemaker. A pacemaker is a real time critical system; therefore, it must be very reliable. Accordingly, Fault-Tolerant techniques should be applied to the FPGA-based pulse generator. Two Fault-Tolerant techniques are under investigation: two Duplication With comparison (DWC) circuits and Sift-out. The fault model used is Single Event Upsets (SEUs). Remote recovery takes place using DPR. Markov Models are used for reliability calculations. Results show that the Sift-Out technique is more reliable than the two DWC one.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122292064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature selection using dynamic binary particle swarm optimization for Arabian horse identification system 基于动态二元粒子群优化的阿拉伯马识别系统特征选择
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275389
Samar I. Zekrallah, Mona M. Soliman, A. Hassanien
{"title":"Feature selection using dynamic binary particle swarm optimization for Arabian horse identification system","authors":"Samar I. Zekrallah, Mona M. Soliman, A. Hassanien","doi":"10.1109/ICCES.2017.8275389","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275389","url":null,"abstract":"Being able to formally identify horses is crucial for many reasons like biosecurity and regulatory risks, fairness in competition to ensure the proper horse and owner are competing in an event, retrieval after theft and medical record management. Among different horses types Arabian horse is one of the top ten popular horse breeds all over the world. It is the most expensive horse in the market. Such horse identification system can be based on biometric parameters. This work aims to introduce a novel method of periocular region segmentation using Otsu based method in combination with Improved Fruit Fly Optimization Algorithm (IFOA) followed by a feature extraction and selection phase for Arabian horse identification system. The segmented horse periocular region is subjected to texture analysis using Gabor filter and discrete cosine transform for proper feature extraction. A proper Feature Selection step is performed with the aim of selecting optimum features. Such optimal set of features will be used later in Arabian horse identification and recognition system. Such optimal feature selection is achieved using Dynamic Binary Particle Swarm Optimization.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet of Things (IoT) security platforms 物联网安全平台
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275359
Ibrahim R. Waz, M. Sobh, Ayman M. Bahaa-Eldin
{"title":"Internet of Things (IoT) security platforms","authors":"Ibrahim R. Waz, M. Sobh, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES.2017.8275359","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275359","url":null,"abstract":"This survey introduces IoT security items and how to achieve the requirements of these items in a constrained environment to guarantee security in every stage (Device, transmission of data, data on reset, service, and user). Also, it combines these items in one stack to deal with different IoT platforms, this made integration between items to assure the continuity of security from one stage to another stage and helps to have a full tracing of data from IoT device through the middleware to the user and vice versa. Also this paper presents different studies on available IoT platforms.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121198622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Protecting openflow switches against denial of service attacks 保护openflow交换机免受拒绝服务攻击
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275355
Ayman M. Bahaa-Eldin, Ebada Essam-Eldin ElDessouky, H. Dağ
{"title":"Protecting openflow switches against denial of service attacks","authors":"Ayman M. Bahaa-Eldin, Ebada Essam-Eldin ElDessouky, H. Dağ","doi":"10.1109/ICCES.2017.8275355","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275355","url":null,"abstract":"This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible, programmable, and can be used for several functionalities within a network. As the control algorithm of the switch is implemented on a separate computer (Controller), this software can be implemented on any part of the network packet including Layers 2, 3, and 4 headers. Therefore, an Openflow switch can work as a conventional switch, a router or a firewall. The open design of Openflow makes it vulnerable to several types of DoS attacks. One of those attacks is to overwhelm the switch flow table with entities larger than its buffer making legitimate packets unable to traverse the switch. The proposed approach depends on a Sandbox like model, where a second switch and controller is implemented and all new packets with no matching rules are forwarded to the Sandbox. The Sandbox clone is monitored and controlled, so a forwarding rule is always created on the Sandbox switch and transferred only to the working switch when it is classified as a normal rule. Otherwise, a cleanup operation is executed periodically on the sandbox switch to remove malicious rules. Rules are classified based on the statistics entries already existing in Openflow switches flow table. The proposed approach is simple and does not need any extra memory or modifications in the switches. It is proven to mitigate this type of DoS attacks.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A robust distributed authorization scheme for availability enhancement in VANET 用于VANET中可用性增强的健壮的分布式授权方案
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275375
A. Ali, Fatty M. Salem
{"title":"A robust distributed authorization scheme for availability enhancement in VANET","authors":"A. Ali, Fatty M. Salem","doi":"10.1109/ICCES.2017.8275375","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275375","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) have become one of the platforms for relaying information in the Internet of Things (IOT). Unfortunately, VANETs can be vulnerable to several forms of attacks and threats. To overcome such problems, security and availability enhancing mechanisms are essential for VANET deployment. Clustering is one of the key points in VANETs, where cluster structure can facilitate overcoming some of the challenging issues in VANETs specially the security requirements. Secured and stable clustering play a significant role in VANET credibility. In terms of security, we shouldn't rely on centralized Certificate Authority (CA) in each cluster as it could be vulnerable to potential attacks and hence participant nodes in this cluster might lose access to it. Therefore, deploying decentralized approach for distributing the authorization inside clusters will overcome the authorization problem if the CA disappears or went missing. In this paper, we propose a distributed authorization scheme in which the role of the CA is distributed among a number of trusted nodes forming Certification Authority Committee (CAC). Since the certification authority, nodes' information and network secrets will be distributed over the CAC members, the presented scheme effectively guarantees both cluster stability and availability of security services. We analyzed the proposed scheme in terms of computation and storage complexity, communications overhead as well as network service availability. The results show that the availability of network services is greatly enhanced in adverse network status. This enhancement will be at the cost of negligible increment in storage complexity and communications overhead whereas the computational complexity is relative to the other distributed schemes.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Autonomic management of MPLS backbone networks using SDNs 通过sdn实现MPLS骨干网的自主管理
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275298
Mohammad Mousa, Ayman M. Bahaa-Eldin, M. Sobh
{"title":"Autonomic management of MPLS backbone networks using SDNs","authors":"Mohammad Mousa, Ayman M. Bahaa-Eldin, M. Sobh","doi":"10.1109/ICCES.2017.8275298","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275298","url":null,"abstract":"In MPLS backbone networks, network management complexity is rapidly increasing with the massive increase in network traffic. In addition, fast service creation and seamless failure recovery are highly desired operational requirements for many of the future safety and medical IoT services. On the other hand, Autonomic Network Management tends to be a very promising solution for most of the current network management challenges. In this paper, we tackle the problem of building an autonomic MPLS backbone network using SDNs. We have implemented a framework “OpenSP” as a prototype of the idea. Network operators are supposed to enter the service requirements from the customer point of view and OpenSP will take care of different network management tasks like forwarding rules generation, traffic engineering and failure recovery. Simulation results show a great enhancement in terms of the reduction of the network management complexity and the increase of the network efficiency.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An efficient system for Melanoma diagnosis in dermoscopic images 皮肤镜图像中黑色素瘤诊断的有效系统
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275278
A. Afifi, K. M. Amin
{"title":"An efficient system for Melanoma diagnosis in dermoscopic images","authors":"A. Afifi, K. M. Amin","doi":"10.1109/ICCES.2017.8275278","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275278","url":null,"abstract":"In this work, an automatic computer aided diagnosis system for Melanoma in dermoscopic images is proposed. In which, a large set of features is extracted from normalized tumor area to mimic the well-known ABCD clinical diagnosis rule. Consequently, to select the most prominent set of features, a recursive feature elimination algorithm based on random forests classifier is utilized. To alleviate classes imbalance problem which usually occurs in clinical situations, the neighborhood cleaning rule (NCL) and the borderline synthetic minority over-sampling (Borderline-SMOTE) algorithms are integrated to produce a better balanced dataset. The final diagnosis is then obtained by utilizing an extra tree classifier which builds an ensemble of classifiers using different sets of features and makes a late fusion. This proposed pipeline allows the diagnosis system to perform well in different challenging situations. Evaluation of the proposed system was performed using a recently released dataset which has a large classes imbalance. The experimental results indicate the efficiency of proposed system. It achieves the best average precision score among recent competitors who use the same dataset. Moreover, it makes a better balance between sensitivity and specificity scores.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced framework for miRNA target prediction 增强的miRNA靶标预测框架
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275367
Emad E. Ahmed, Sherin Elgokhy, M. Saidahmed
{"title":"Enhanced framework for miRNA target prediction","authors":"Emad E. Ahmed, Sherin Elgokhy, M. Saidahmed","doi":"10.1109/ICCES.2017.8275367","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275367","url":null,"abstract":"MicroRNAs are small non-coding RNA molecules that play an important role in post-transcriptional gene regulation. They bind with messenger RNAs, affecting the regulation of gene expression causing diseases such as heart diseases and cancer. The two pioneer strategies of miRNA target prediction are either experimentally or computationally. Since experimental techniques are very expensive and slow, several computational tools have been proposed to defeat some of the experimental technical difficulties. In this paper, we propose an enhanced computational framework that predicts miRNA targets depending on structural, positional, and thermodynamic features extracted from the alignment of miRNA and its targets. Then, we select the linearly separable features using the eigenvalue analysis of the covariance matrix of the features. Finally, the selected features are applied to random forest classifier. The obtained results prove that our framework significantly excels other existing tools.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123604545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信