{"title":"Radar false alarm processing using proposed algorithm for Xampling and compressive sensing","authors":"M. Hossiny, Sameh G. Salem, F. Ahmed, K. Moustafa","doi":"10.1109/ICCES.2017.8275267","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275267","url":null,"abstract":"This paper combines application of Compressive Sensing theory in radar signal, and the approach of the Xampling. Based on the characteristic of sparse radar signal, it can be sampled at Finite Rate of Innovation (FRI) [1], Xampling converts high dimensional signal to a lower dimensional signal using Fourier coefficients directly from analog signal [2]. A well-known CAMP algorithm was used to reconstruct the under sampled sparse radar signal and improves its Signal-to-Noise Ratio in case of received radar signal has a high SNR [3]. In present work, a proposed algorithm called Adaptive CAMP algorithm is applied to the radar signal in order to deal with the problem of the false alarms that appear in reconstructed radar signal from the CAMP algorithm in case of received low SNR. The performance of the Adaptive CAMP algorithm as well as the CAMP algorithm is evaluated using the Receiver Characteristic Curve (ROC) to compare the proposed design with the CAMP algorithm in case of low SNR.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital signature and authentication mechanisms using new customized hash function for cognitive radio networks","authors":"John N. Soliman, T. A. Mageed, H. El-Hennawy","doi":"10.1109/ICCES.2017.8275299","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275299","url":null,"abstract":"Wireless technologies, applications and services have been witnessed a rapid growth in the past few years, due to this development, spectrum scarcity and shortage has become a major concern, several spectrum portions of the static allocated licensed bands are under-utilized. Cognitive radio networks (CRNs) are considered to be the most promising solution in improving the spectrum utilization and solving the spectrum scarcity by providing licensed spectrum portions to unlicensed users, however due to nature of these networks, CRNs are exposed to different types of threats and attacks from different malicious users, which can affect the network availability and performance, in this paper a proposed authentication mechanisms and digital signature scheme applied using new customized hash function for CRNs, the proposed model simulated and tested to provide both primary and secondary users data authentication, data integrity and non-repudiation in CRNs, achieving a defend strategy from the well-known attacks that could be launched by malicious, selfish users, threats and vulnerabilities in CRNs.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129184430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samah Kamel, Tamer F. Ghanem, K. M. Amin, H. Abdelkader
{"title":"Efficient energy management technique for WSNs","authors":"Samah Kamel, Tamer F. Ghanem, K. M. Amin, H. Abdelkader","doi":"10.1109/ICCES.2017.8275289","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275289","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of small, inexpensive sensors that communicate among each other using number of elected sensors known as cluster heads. These cluster heads collect data from neighbours, process it, then transmit it to the network base station (sink). Each WSN sensor has limited processing power, limited memory, radio transceiver with an internal or external antenna, and limited battery. Due to the limitation of sensor power source, energy conservation is considered a prominent issue in WSN. In this paper, a proposed energy conservation method is presented to extend the WSN lifetime. The proposed method is based on enhancing the selection of sensor nodes that act as clusters heads (CH) during the network lifetime. Moreover, data transmission rate between sensors and clusters heads is controlled for best possible energy conservation. Extensive simulations show that the proposed method improves energy conservation compared to LEACH and H-LEACH with an average of 35% and 14% respectively. In addition, energy consumption is balanced among network sensors which extends the network lifetime.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient image segmentation of RGB-D images","authors":"Islam I. Fouad, S. Rady, M. Mostafa","doi":"10.1109/ICCES.2017.8275331","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275331","url":null,"abstract":"Image segmentation is a fundamental problem in computer vision. With the current advent of depth sensors, it is gradually becoming a research focus on how to utilize the depth information to improve image segmentation. This paper proposes an automatic RGB-D image segmentation method in which the depth and RGB images are separately segmented and the result is combined, hence obtaining better segmentation results. The proposed segmentation is applied in five phases: 1) Edge detection, 2) Morphological operations employed for enhancing the edge detection result. 3) Connected components' processing applied for labeling each region in the image, 4) Extraction for the missing components and merging with result in step 3. (The previous four steps are applied on the RGB image). 5) The result of depth and RGB segmentation are finally combined. Experiments carried on ‘NYU Depth Dataset V2’ which contains RGB and depth images, have proven the efficiency of the proposed segmentation method.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing accuracy and security of ADS-B via MLAT assisted-flight information system","authors":"Ahmed Abdel Wahab El Marady","doi":"10.1109/ICCES.2017.8275300","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275300","url":null,"abstract":"Existing traditional radar techniques are not suitable for precise positioning of the aircraft. Recently, Automatic Dependent Surveillance-Broadcast (ADS-B) has used to accurately determine the aircraft's position. Unfortunately, ADS-B technique suffers from cybersecurity issues like jamming and spoofing. In order to validate the ADS-B signal and enhance the aircraft's position, ADS-B/MLAT data fusion is used which uses the dynamic flight model of aircraft. In contrast, this paper presents reliable and high precise ADS-B/MLAT data fusion surveillance framework that uses the dynamic flight model of aircraft and flight information system. Our results show that the accuracy of the proposed framework is 49%, 49% and 13.8% better than ADS-B, multilateration and surveillance techniques that use the dynamic flight model of aircraft only for aircraft near the airport.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116788560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA based energy detection spectrum sensing for cognitive radios under noise uncertainty","authors":"M. Fouda, A. S. Eldien, H. Mansour","doi":"10.1109/ICCES.2017.8275374","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275374","url":null,"abstract":"To improve the efficiency of bandwidth usage, the cognitive radios concept has emerged. Spectrum sensing is a pivotal function in cognitive radio systems so that the secondary users can be able to access the free spectrum holes without interfering with primary users. Energy detection is the most common and easiest spectrum sensing technique for cognitive radios. In this paper, the conventional energy detection receiver operating characteristic curve and performance metrics are simulated under additive white Gaussian noise (AWGN) environment by using Monte Carlo simulation. Also, the performance of energy detection is analyzed under different types of M-ary modulation. The analysis of performance will carry the assumption of noise uncertainty. This performance gain is compared with conventional energy detection without any noise effect. In addition, the relation between a number of samples and signal to noise ratio wall (SNR wall) is provided and simulated. The simulation tool used in the analysis is MATLAB software. Finally, the implementation of energy detection technique in the time domain and frequency domain is designed on Xilinx Spartan-3E (XC3S500E-FG320) Field Programmable Gate Array (FPGA) kit by using Verilog language and Xilinx ISE Simulator version 14.1.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low computation message delivery and authentication VANET protocol","authors":"Islam Z. Ahmed, Taha M. Mohamed, R. Sadek","doi":"10.1109/ICCES.2017.8275303","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275303","url":null,"abstract":"In vehicular ad hoc networks (VANET), in order to preserve the real identity of message sender from attackers, message authenticity and integrity verification should be performed swiftly. Reducing the computations and communication overhead is highly needed. The proposed protocol focuses on reducing the computation required for the road side communication V2I without affecting the security level. The proposed low computational protocol generates and exchanges symmetric key in the public channel without using Diffie-Hellman protocol in hybrid with using low computation RSA that uses Chinese Remainder Theorem (CRT-RSA) instead of using traditional RSA. The simulation experiments show that the proposed protocol decreases the computational overhead significantly with 90.6% compared to other developed protocols. Also, hypothesis of the different security requirements for the safety messages versus the non-safety (entertainment) messages is examined.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sahlol, Yasmine S. Moemen, A. Ewees, A. Hassanien
{"title":"Evaluation of cisplatin efficiency as a chemotherapeutic drug based on neural networks optimized by genetic algorithm","authors":"A. Sahlol, Yasmine S. Moemen, A. Ewees, A. Hassanien","doi":"10.1109/ICCES.2017.8275391","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275391","url":null,"abstract":"Cisplatin is an active drug against many types of cancers; its effect appears through genetic toxicity which caused by interaction with the DNA of the cell. The gene expressions prediction of the patients is a very vital process in estimating the drug response. In this paper, we proposed an optimized Neural Networks (NNs) by Genetic Algorithm (GA) for evaluation of cisplatin efficiency as a chemotherapeutic drug. The proposed approach minimizes the error between the actual and the predicted genes until reaching the minimum Mean Square Error (MSE) of NNs which accordingly, improve the prediction accuracy. We used a public dataset (divided into five sub-datasets), where that data demonstrated the genotoxicity of different chemicals like cisplatin, sodium, chloride, and taxol. It was used only cisplatin as an indicator of DNA damage. The prediction accuracy of the optimized NNs by GA was high as lower MSE achieved in all sub-datasets.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121875823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kholidy, Ali Tekeoglu, Stefano Iannucci, S. Sengupta, Qian Chen, S. Abdelwahed, John Hamilton
{"title":"Attacks detection in SCADA systems using an improved non-nested generalized exemplars algorithm","authors":"H. Kholidy, Ali Tekeoglu, Stefano Iannucci, S. Sengupta, Qian Chen, S. Abdelwahed, John Hamilton","doi":"10.1109/ICCES.2017.8275377","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275377","url":null,"abstract":"Supervisory Control and Data Acquisition (SCADA) systems became vital targets for intruders because of the large volume of its sensitive data. The Cyber Physical Power Systems (CPPS) is an example of these systems in which the deregulation and multipoint communication between consumers and utilities involve large volume of high speed heterogeneous data. The Non-Nested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. However, NNGE algorithm tends to produce rules that test a large number of input features. This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce our new Feature Selection and Data Reduction Method (FSDRM) to improve the classification accuracy and speed of the NNGE algorithm and to reduce the computational resource consumption. FSDRM provides the following functionalities: (1) it reduces the dataset features by selecting the most significant ones, (2) it reduces the NNGE's hyperrectangles classifiers. The experiments show that the FSDRM reduces the NNGE hyperrectangles by 29.06%, 37.34%, and 26.76% and improves the classification accuracy of the NNGE by 8.57%, 4.19%, and 3.78% using the Multi, Binary, and Triple class datasets respectively.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"641 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Faragalla, M. Ewais, H. Ragai, M. S. Badran, H. Issa
{"title":"Impact of process variability on FinFET 6T SRAM cells for physical unclonable functions (PUFs)","authors":"M. Faragalla, M. Ewais, H. Ragai, M. S. Badran, H. Issa","doi":"10.1109/ICCES.2017.8275272","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275272","url":null,"abstract":"The behavior of 6T SRAM cells in presence of process variability for physical unclonable functions (PUFs) is analyzed on the 16 nm FinFET technology. Both systematic and random threshold voltage variations are considered in this analysis. Randomness prosperity of the secret keys generated from the SRAM cell is tested. Supply voltage ramp-up impact on the cells start-up values is also analyzed at different mismatch amounts.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}