2017 12th International Conference on Computer Engineering and Systems (ICCES)最新文献

筛选
英文 中文
Radar false alarm processing using proposed algorithm for Xampling and compressive sensing 采用所提出的算法对雷达虚警进行采样和压缩感知处理
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275267
M. Hossiny, Sameh G. Salem, F. Ahmed, K. Moustafa
{"title":"Radar false alarm processing using proposed algorithm for Xampling and compressive sensing","authors":"M. Hossiny, Sameh G. Salem, F. Ahmed, K. Moustafa","doi":"10.1109/ICCES.2017.8275267","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275267","url":null,"abstract":"This paper combines application of Compressive Sensing theory in radar signal, and the approach of the Xampling. Based on the characteristic of sparse radar signal, it can be sampled at Finite Rate of Innovation (FRI) [1], Xampling converts high dimensional signal to a lower dimensional signal using Fourier coefficients directly from analog signal [2]. A well-known CAMP algorithm was used to reconstruct the under sampled sparse radar signal and improves its Signal-to-Noise Ratio in case of received radar signal has a high SNR [3]. In present work, a proposed algorithm called Adaptive CAMP algorithm is applied to the radar signal in order to deal with the problem of the false alarms that appear in reconstructed radar signal from the CAMP algorithm in case of received low SNR. The performance of the Adaptive CAMP algorithm as well as the CAMP algorithm is evaluated using the Receiver Characteristic Curve (ROC) to compare the proposed design with the CAMP algorithm in case of low SNR.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital signature and authentication mechanisms using new customized hash function for cognitive radio networks 基于自定义哈希函数的认知无线网络数字签名和认证机制
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275299
John N. Soliman, T. A. Mageed, H. El-Hennawy
{"title":"Digital signature and authentication mechanisms using new customized hash function for cognitive radio networks","authors":"John N. Soliman, T. A. Mageed, H. El-Hennawy","doi":"10.1109/ICCES.2017.8275299","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275299","url":null,"abstract":"Wireless technologies, applications and services have been witnessed a rapid growth in the past few years, due to this development, spectrum scarcity and shortage has become a major concern, several spectrum portions of the static allocated licensed bands are under-utilized. Cognitive radio networks (CRNs) are considered to be the most promising solution in improving the spectrum utilization and solving the spectrum scarcity by providing licensed spectrum portions to unlicensed users, however due to nature of these networks, CRNs are exposed to different types of threats and attacks from different malicious users, which can affect the network availability and performance, in this paper a proposed authentication mechanisms and digital signature scheme applied using new customized hash function for CRNs, the proposed model simulated and tested to provide both primary and secondary users data authentication, data integrity and non-repudiation in CRNs, achieving a defend strategy from the well-known attacks that could be launched by malicious, selfish users, threats and vulnerabilities in CRNs.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129184430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient energy management technique for WSNs 无线传感器网络的高效能量管理技术
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275289
Samah Kamel, Tamer F. Ghanem, K. M. Amin, H. Abdelkader
{"title":"Efficient energy management technique for WSNs","authors":"Samah Kamel, Tamer F. Ghanem, K. M. Amin, H. Abdelkader","doi":"10.1109/ICCES.2017.8275289","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275289","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of small, inexpensive sensors that communicate among each other using number of elected sensors known as cluster heads. These cluster heads collect data from neighbours, process it, then transmit it to the network base station (sink). Each WSN sensor has limited processing power, limited memory, radio transceiver with an internal or external antenna, and limited battery. Due to the limitation of sensor power source, energy conservation is considered a prominent issue in WSN. In this paper, a proposed energy conservation method is presented to extend the WSN lifetime. The proposed method is based on enhancing the selection of sensor nodes that act as clusters heads (CH) during the network lifetime. Moreover, data transmission rate between sensors and clusters heads is controlled for best possible energy conservation. Extensive simulations show that the proposed method improves energy conservation compared to LEACH and H-LEACH with an average of 35% and 14% respectively. In addition, energy consumption is balanced among network sensors which extends the network lifetime.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient image segmentation of RGB-D images RGB-D图像的高效分割
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275331
Islam I. Fouad, S. Rady, M. Mostafa
{"title":"Efficient image segmentation of RGB-D images","authors":"Islam I. Fouad, S. Rady, M. Mostafa","doi":"10.1109/ICCES.2017.8275331","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275331","url":null,"abstract":"Image segmentation is a fundamental problem in computer vision. With the current advent of depth sensors, it is gradually becoming a research focus on how to utilize the depth information to improve image segmentation. This paper proposes an automatic RGB-D image segmentation method in which the depth and RGB images are separately segmented and the result is combined, hence obtaining better segmentation results. The proposed segmentation is applied in five phases: 1) Edge detection, 2) Morphological operations employed for enhancing the edge detection result. 3) Connected components' processing applied for labeling each region in the image, 4) Extraction for the missing components and merging with result in step 3. (The previous four steps are applied on the RGB image). 5) The result of depth and RGB segmentation are finally combined. Experiments carried on ‘NYU Depth Dataset V2’ which contains RGB and depth images, have proven the efficiency of the proposed segmentation method.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing accuracy and security of ADS-B via MLAT assisted-flight information system 利用MLAT辅助飞行信息系统提高ADS-B的准确性和安全性
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275300
Ahmed Abdel Wahab El Marady
{"title":"Enhancing accuracy and security of ADS-B via MLAT assisted-flight information system","authors":"Ahmed Abdel Wahab El Marady","doi":"10.1109/ICCES.2017.8275300","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275300","url":null,"abstract":"Existing traditional radar techniques are not suitable for precise positioning of the aircraft. Recently, Automatic Dependent Surveillance-Broadcast (ADS-B) has used to accurately determine the aircraft's position. Unfortunately, ADS-B technique suffers from cybersecurity issues like jamming and spoofing. In order to validate the ADS-B signal and enhance the aircraft's position, ADS-B/MLAT data fusion is used which uses the dynamic flight model of aircraft. In contrast, this paper presents reliable and high precise ADS-B/MLAT data fusion surveillance framework that uses the dynamic flight model of aircraft and flight information system. Our results show that the accuracy of the proposed framework is 49%, 49% and 13.8% better than ADS-B, multilateration and surveillance techniques that use the dynamic flight model of aircraft only for aircraft near the airport.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116788560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
FPGA based energy detection spectrum sensing for cognitive radios under noise uncertainty 基于FPGA的认知无线电噪声不确定性能量检测频谱感知
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275374
M. Fouda, A. S. Eldien, H. Mansour
{"title":"FPGA based energy detection spectrum sensing for cognitive radios under noise uncertainty","authors":"M. Fouda, A. S. Eldien, H. Mansour","doi":"10.1109/ICCES.2017.8275374","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275374","url":null,"abstract":"To improve the efficiency of bandwidth usage, the cognitive radios concept has emerged. Spectrum sensing is a pivotal function in cognitive radio systems so that the secondary users can be able to access the free spectrum holes without interfering with primary users. Energy detection is the most common and easiest spectrum sensing technique for cognitive radios. In this paper, the conventional energy detection receiver operating characteristic curve and performance metrics are simulated under additive white Gaussian noise (AWGN) environment by using Monte Carlo simulation. Also, the performance of energy detection is analyzed under different types of M-ary modulation. The analysis of performance will carry the assumption of noise uncertainty. This performance gain is compared with conventional energy detection without any noise effect. In addition, the relation between a number of samples and signal to noise ratio wall (SNR wall) is provided and simulated. The simulation tool used in the analysis is MATLAB software. Finally, the implementation of energy detection technique in the time domain and frequency domain is designed on Xilinx Spartan-3E (XC3S500E-FG320) Field Programmable Gate Array (FPGA) kit by using Verilog language and Xilinx ISE Simulator version 14.1.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A low computation message delivery and authentication VANET protocol 一种低计算量的消息传递和认证VANET协议
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275303
Islam Z. Ahmed, Taha M. Mohamed, R. Sadek
{"title":"A low computation message delivery and authentication VANET protocol","authors":"Islam Z. Ahmed, Taha M. Mohamed, R. Sadek","doi":"10.1109/ICCES.2017.8275303","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275303","url":null,"abstract":"In vehicular ad hoc networks (VANET), in order to preserve the real identity of message sender from attackers, message authenticity and integrity verification should be performed swiftly. Reducing the computations and communication overhead is highly needed. The proposed protocol focuses on reducing the computation required for the road side communication V2I without affecting the security level. The proposed low computational protocol generates and exchanges symmetric key in the public channel without using Diffie-Hellman protocol in hybrid with using low computation RSA that uses Chinese Remainder Theorem (CRT-RSA) instead of using traditional RSA. The simulation experiments show that the proposed protocol decreases the computational overhead significantly with 90.6% compared to other developed protocols. Also, hypothesis of the different security requirements for the safety messages versus the non-safety (entertainment) messages is examined.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of cisplatin efficiency as a chemotherapeutic drug based on neural networks optimized by genetic algorithm 基于遗传算法优化神经网络的顺铂化疗疗效评价
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275391
A. Sahlol, Yasmine S. Moemen, A. Ewees, A. Hassanien
{"title":"Evaluation of cisplatin efficiency as a chemotherapeutic drug based on neural networks optimized by genetic algorithm","authors":"A. Sahlol, Yasmine S. Moemen, A. Ewees, A. Hassanien","doi":"10.1109/ICCES.2017.8275391","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275391","url":null,"abstract":"Cisplatin is an active drug against many types of cancers; its effect appears through genetic toxicity which caused by interaction with the DNA of the cell. The gene expressions prediction of the patients is a very vital process in estimating the drug response. In this paper, we proposed an optimized Neural Networks (NNs) by Genetic Algorithm (GA) for evaluation of cisplatin efficiency as a chemotherapeutic drug. The proposed approach minimizes the error between the actual and the predicted genes until reaching the minimum Mean Square Error (MSE) of NNs which accordingly, improve the prediction accuracy. We used a public dataset (divided into five sub-datasets), where that data demonstrated the genotoxicity of different chemicals like cisplatin, sodium, chloride, and taxol. It was used only cisplatin as an indicator of DNA damage. The prediction accuracy of the optimized NNs by GA was high as lower MSE achieved in all sub-datasets.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121875823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Attacks detection in SCADA systems using an improved non-nested generalized exemplars algorithm 基于改进的非嵌套广义示例算法的SCADA系统攻击检测
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275377
H. Kholidy, Ali Tekeoglu, Stefano Iannucci, S. Sengupta, Qian Chen, S. Abdelwahed, John Hamilton
{"title":"Attacks detection in SCADA systems using an improved non-nested generalized exemplars algorithm","authors":"H. Kholidy, Ali Tekeoglu, Stefano Iannucci, S. Sengupta, Qian Chen, S. Abdelwahed, John Hamilton","doi":"10.1109/ICCES.2017.8275377","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275377","url":null,"abstract":"Supervisory Control and Data Acquisition (SCADA) systems became vital targets for intruders because of the large volume of its sensitive data. The Cyber Physical Power Systems (CPPS) is an example of these systems in which the deregulation and multipoint communication between consumers and utilities involve large volume of high speed heterogeneous data. The Non-Nested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. However, NNGE algorithm tends to produce rules that test a large number of input features. This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce our new Feature Selection and Data Reduction Method (FSDRM) to improve the classification accuracy and speed of the NNGE algorithm and to reduce the computational resource consumption. FSDRM provides the following functionalities: (1) it reduces the dataset features by selecting the most significant ones, (2) it reduces the NNGE's hyperrectangles classifiers. The experiments show that the FSDRM reduces the NNGE hyperrectangles by 29.06%, 37.34%, and 26.76% and improves the classification accuracy of the NNGE by 8.57%, 4.19%, and 3.78% using the Multi, Binary, and Triple class datasets respectively.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"641 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Impact of process variability on FinFET 6T SRAM cells for physical unclonable functions (PUFs) 工艺可变性对物理不可克隆功能(puf)的FinFET 6T SRAM单元的影响
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275272
M. Faragalla, M. Ewais, H. Ragai, M. S. Badran, H. Issa
{"title":"Impact of process variability on FinFET 6T SRAM cells for physical unclonable functions (PUFs)","authors":"M. Faragalla, M. Ewais, H. Ragai, M. S. Badran, H. Issa","doi":"10.1109/ICCES.2017.8275272","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275272","url":null,"abstract":"The behavior of 6T SRAM cells in presence of process variability for physical unclonable functions (PUFs) is analyzed on the 16 nm FinFET technology. Both systematic and random threshold voltage variations are considered in this analysis. Randomness prosperity of the secret keys generated from the SRAM cell is tested. Supply voltage ramp-up impact on the cells start-up values is also analyzed at different mismatch amounts.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信