{"title":"Using super resolution to enhance license plates recognition accuracy","authors":"Menna A Ghoneim, M. Rehan, Hisham Othman","doi":"10.1109/ICCES.2017.8275361","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275361","url":null,"abstract":"License Plate Recognition (LPR) has become one of the most widely used applications. One of the main factors affecting the accuracy of LPR is the quality of the image containing the plate. In case of video-based solutions, many frames are captured for the same car. Super Resolution (SR) techniques can be used for enhancing LPR accuracy by constructing one high resolution image from a number of low resolution images that belong to the same car. However because of the nature of the detected object (car plate), motion analysis as well as object perspective correction need to be taken into consideration when applying the SR algorithm over the provided series of video frames containing the moving car, in order to enhance the resolution of the plate area. This paper aims at providing an implementation for a SR algorithm where input frames are put together into one high-resolution image after detecting the license plate and removing the noisy frames to provide one clear and focused image as an output. OpenCV library was modified to support this implementation. This implementation enhanced the accuracy of an LPR solution by approximately 7% enhancement while trying to not increase the computational complexity of the original solution.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125936593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote control and monitoring of fish farms using wireless sensor networks","authors":"H. Ragai, I. Adly, H. Sayour, Samuel Wilson","doi":"10.1109/ICCES.2017.8275287","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275287","url":null,"abstract":"This work represents a proof-of-concept for remote monitoring and control of fish farms using WSN (Wireless Sensor Networks). The system allows a 24/7 live monitoring of water quality (mainly Temperature, pH value and Dissolved Oxygen value) in fish farms. The system is remotely accessed through the Internet via Desktop PCs and Mobile Phones. The system has the capability of sending alarms via different methods (emails or website notifications) to fish farms administrators. Thus, allowing them to take appropriate measures by means of remote actuation of different utilities installed in the fish tanks. The system aims to reduce the accidental mortality of fish which might happen due to water pollution or sudden environmental changes.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130764866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dina M. Ellaithy, M. El-Moursy, G. H. Ibrahim, Amal Zaki, A. Zekry
{"title":"Double logarithmic arithmetic technique for GPU","authors":"Dina M. Ellaithy, M. El-Moursy, G. H. Ibrahim, Amal Zaki, A. Zekry","doi":"10.1109/ICCES.2017.8275335","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275335","url":null,"abstract":"An efficient manipulation of the logarithmic number system (LNS) is proposed resulting in saving in power and area of graphical processing unit (GPU). Double Logarithmic Arithmetic (DLA) approach is presented to achieve low power applications. The proposed scheme exploits the logarithmic field and enhances the computation of the transcendental operations and the lighting pattern operations for energy and area efficiency. The DLA is exploited by means of cascading logarithmic converters to completely eliminate multipliers. Comparison results show that this work achieves up to 51% saving in power and 40% area reduction as compared to the current schemes. The proposed methodology can implement all the transcendental processes utilizing multiplier-free hardware structural.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed G. B. Atia, Omar Salah, B. Medhat, K. Ibrahim
{"title":"Design and analysis of low cost upper limb exoskeleton","authors":"Mohamed G. B. Atia, Omar Salah, B. Medhat, K. Ibrahim","doi":"10.1109/ICCES.2017.8275281","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275281","url":null,"abstract":"This research describes the design, kinematic and dynamic model of upper limb exoskeleton. This exoskeleton is designed to assist elderly people or people who suffer from feebleness in their upper limbs. The proposed exoskeleton follows the user movement by using IMU sensors which are attached to user to measure the arm joint angles. In this paper, the kinematic and dynamic equations are described. Furthermore, Simulation program and experiments are carried out to evaluate and validate the performance of model and the real prototype. The results show a good tracking and performance for both model and real prototype.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled M. Abdelwahab, M. Rehan, M. A. Salem, Hisham Othman
{"title":"High density people estimation in video surveillance","authors":"Khaled M. Abdelwahab, M. Rehan, M. A. Salem, Hisham Othman","doi":"10.1109/ICCES.2017.8275348","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275348","url":null,"abstract":"Pedestrian detection is a challenging problem in computer vision due to difficulties such as occlusion and diversity of pedestrian visual features. The complexity of the problem increases as the diversity of the pedestrians in the scene being analyzed increases. Different approaches have been proposed. Among these approaches, the ones that involve supervised techniques for head detection have shown robust results and better accuracy. In this paper, we provide a comparison of the accuracy and performance of cascaded classifiers based on two different feature extractors, notably, the Haar-Like and the Local Binary Pattern (LBP) features extractors. It has been found that increasing the diversity and size of the training dataset leads to improvements in the resulting detectors. Therefore, four different training datasets have been constructed using standard training sets as well as our own created images for crowded scenes. Moreover, we introduce a tuning scheme for the parameters of the detector. The results obtained exceeded 80% for precision on high density images and more than 90% on lower density images.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LLC resonant DC-DC converter for grid-connected PV system","authors":"A. Ragab, N. H. Saad, A. A. El-sattar","doi":"10.1109/ICCES.2017.8275318","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275318","url":null,"abstract":"Resonant DC-DC converters have been used widely as efficient alternatives for traditional DC-DC converters that suffer from the problems of high switching losses and low power density. Resonant converters implement soft switching mechanisms like zero current switching (ZCS) and zero voltage switching (ZVS) which allows for high frequency operation together with minimum switching losses. A resonant DC-DC converter is proposed for grid connected double stage photovoltaic (PV) system. A LLC resonant converter is applied to boost the PV array terminal voltage and carry out maximum power point tracking (MPPT). The incremental conductance concept is applied using a PI controller for maximum power extraction from the PV array. A neutral point clamped three level voltage source inverter (VSI) is used to interface the PV system with the grid. The VSI controller performs two tasks; regulating the voltage of the DC bus and synchronizing injected currents with grid voltages to realize a unity power factor. A simulation study executed in MATLAB/SIMULINK environment is presented to verify the dynamic response of the proposed system to different kinds of disturbance in solar irradiance.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"7 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Underdetermined separation of instantaneous speech mixtures with hierarchical sparse recovery scheme","authors":"Zhe Wang, G. Bi, Xiumei Li","doi":"10.1109/ICCES.2017.8275344","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275344","url":null,"abstract":"This paper describes a novel algorithm for underdetermined instantaneous speech separation problem based on hierarchical sparse Bayesian technique for efficient data reconstruction. The proposed algorithm consists of three steps. The unknown mixing matrix is firstly estimated from the speech mixtures in the transform domain. Then, a permutation issue is solved based on the results from the first step to get the correct order of the dictionary. Finally speech sources are recovered using the hierarchical sparse structure of the mixed speech signals. Numerical experiments including the comparison with other sparse representation approach are provided to show that our proposed method could reduce the interference effectively and achieve desirable performance improvement.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"99 32","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reham Taher El-Maghraby, Nada Mostafa Abd Elazim, Ayman M. Bahaa-Eldin
{"title":"A survey on deep packet inspection","authors":"Reham Taher El-Maghraby, Nada Mostafa Abd Elazim, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES.2017.8275301","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275301","url":null,"abstract":"Deep Packet Inspection (DPI) considered as one of the most important parts in content-aware network applications such as copyright enforcement, Intrusion detection system (IDS) and other applications will be discussed later. DPI rely on comparing to parts payload and signature (IP header). IT compares them with known signatures to decide if the packet is harmful (similar to any of attacks database signatures) and delete it or pass it through the network flow. it deals with the content below the 4th layer of the IP packet that includes source and destination ports, source and destination addresses and type of protocol. It classifies type of the application depending on its port number. For signature comparison, many algorithms are applied such as regular expressions (most popular) and others discussed later. Nowadays many applications rely on DPI for inspecting packets in network stream. This survey gives a brief idea about challenges in DPI and some of the design objectives. Then explaining in short words different matching algorithms with their limitations. At the end, some of the most popular techniques using DPI.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122429643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Karaim, H. Elghamrawy, M. Tamazin, A. Noureldin
{"title":"Investigation of the effects of White Gaussian Noise jamming on commercial GNSS receivers","authors":"M. Karaim, H. Elghamrawy, M. Tamazin, A. Noureldin","doi":"10.1109/ICCES.2017.8275353","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275353","url":null,"abstract":"Satellite-based navigation and location technology has become an important tool for many positioning, navigation, and timing services. However, with increased use of Global Navigation Satellite Systems (GNSS) comes a major challenge — GNSS signal jamming, which is an intentional form of interference. Nearly all electronic equipment using services generated by GNSS receivers is susceptible to jamming, and its effects include degradation in received signal power and receiver clock drift. Jamming signals are categorized as narrowband and wideband signals according to the bandwidth of the target signal. One common type that has recently been researched is White Gaussian Noise (WGN) jamming. Several studies investigated the impact of such signal jamming on the performance of GNSS receivers under a variety of jamming conditions. This paper, on the contrary, investigates the effects of White Gaussian Noise jamming on the performance of both high-sensitivity and standard GNSS commercial receivers. Additionally, the performance of GPS-only receivers versus combined GPS/GLONASS receivers under jamming scenarios is explored. This study used receivers by NovAtel and UBlox, with simulation scenarios created using Spirent SimGEN™ with the GSS6700 Multi-GNSS Simulator. The jamming signals were generated using an Agilent interference signal generator (ISG) unit. The results show that the receivers responded differently to the jamming signals. Dilution of Precision (DOP) and the Carrier-to-Noise (C/N0) were the main measures used for the evaluation process. The results show that multi-constellation receivers attained higher resistance for signal jamming effects than GPS only receivers.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pakinam Noureldeen, Marianne A. Azer, A. Refaat, M. Alam
{"title":"Replay attack on lightweight CAN authentication protocol","authors":"Pakinam Noureldeen, Marianne A. Azer, A. Refaat, M. Alam","doi":"10.1109/ICCES.2017.8275376","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275376","url":null,"abstract":"Day after day, users' expectations of tomorrow vehicles' features are increasing. Although the industry's prime goal is users' satisfaction, many unsolved problems are still present. Amongst the major challenges are the huge interconnections and dependability within the Electronic Control Unit (ECU) used inside vehicles. Five years ago, the number of ECUs within a vehicle was about 70 ECUs. This number has doubled nowadays, and it is expected to double again in the near future. This adds challenges to both of network management and network security. The purpose of this paper is to enhance the CAN immunity against attacks. In this paper, we focus on the lightweight CAN authentication protocol, investigate the protocol immunity against Denial of service attack, and propose a solution for this attack. As a result, we achieve security protocol that is suitable for all security aspects.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}