2017 12th International Conference on Computer Engineering and Systems (ICCES)最新文献

筛选
英文 中文
Performance evaluation for video streaming data over LTE-A networks LTE-A网络视频流数据的性能评估
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275396
M. A. Mohamed, Hegazi. Ibrahim
{"title":"Performance evaluation for video streaming data over LTE-A networks","authors":"M. A. Mohamed, Hegazi. Ibrahim","doi":"10.1109/ICCES.2017.8275396","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275396","url":null,"abstract":"As per the noteworthy issues for transmitting and getting video streaming information, it ought to streamline the nature of access to these services to fulfill a reasonable execution for all endorsers. Under the impact of LTE systems, all difficulties for these innovations will be settled by confirming a worthy incentive for the conclusion to end, defer and arrange throughput that considered the most basic parameters for guaranteeing the quality for every one of system's supporters. In this paper, we make an improved system reproduction utilizing OPNET to assess the execution of video streaming information regarding the impact of co-channel interference and MBMS benefits over cutting-edge LTE systems in view of the quality measurements. The recreation comes about had demonstrated that the general framework quality would be streamlined by decreasing the impact of co-channel obstruction in view of supporting jammer hubs.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121604049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of proposed CAC over WiMAX/MPLS-TE/VPN networks 基于WiMAX/MPLS-TE/VPN网络的拟议CAC性能评估
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275373
A. S. G. Allah, Nada El-shennawy, N. El-Fishawy
{"title":"Performance evaluation of proposed CAC over WiMAX/MPLS-TE/VPN networks","authors":"A. S. G. Allah, Nada El-shennawy, N. El-Fishawy","doi":"10.1109/ICCES.2017.8275373","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275373","url":null,"abstract":"The rapid growth of multimedia applications and mobile usage increase the importance of developing new network technologies to support QoS and satisfy the real-time multimedia applications requirements. A combination of many types of network technologies enhances the performance of these applications such as the use of WiMAX, MPLS-TE, and RSVP-TE. There is an important algorithm which supports QoS named CAC. In this paper, a new CAC for MPLS-TE is developed and performance evaluation of the proposed algorithm compared with the most used CAC is introduced by using OPNET simulator and full network frame work consists of WiMAX and MPLS-TE. The results show the outperforms of the proposed algorithm.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human activity recognition using shape moments and normalized fourier descriptors 基于形状矩和归一化傅立叶描述子的人类活动识别
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275332
Hanan Samir, H. Abdelmunim, G. Aly
{"title":"Human activity recognition using shape moments and normalized fourier descriptors","authors":"Hanan Samir, H. Abdelmunim, G. Aly","doi":"10.1109/ICCES.2017.8275332","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275332","url":null,"abstract":"This paper presents a video based system for recognizing different continuous human activities in real time using a single stationary camera. The proposed system has a motion descriptor that contains shape moments as well as normalized Fourier descriptors. The main idea of this system is to detect moving objects in each frame and associate the detections to the same object over time. We employ an efficient thresholding technique to segment the objects of interest. The second stage of the proposed system is to extract the object features. The first feature part is constructed by extracting the object contour and estimate its normalized Fourier descriptors. The other part is extracted by the shape moments. We combined the shape moments to produce an invariant feature that is invariant to rotation, translation and scaling. We adopt the multi-class support vector machines (SVM) and Naive Bayes classifiers. The multi-class SVM shows better performance than the other method with a recognition rate up to 94.46%. We evaluated activity recognition on 325 videos of thirteen distinct Human activities (e.g., Walking, Running, Jumping, Hand-waving, Bending and some suspicious activities like Kicking, Punching, Fall floor and shooting gun, etc.) recorded for 260 different persons. Experimental results on three data set Weizman, KTH and HMDB validate the proposed system reliability and efficiency.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incremental branching adaptive radix tree 增量分支自适应基数树
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275358
Heba El-Fadly, E. Sallam, Mohamed Shoaib
{"title":"Incremental branching adaptive radix tree","authors":"Heba El-Fadly, E. Sallam, Mohamed Shoaib","doi":"10.1109/ICCES.2017.8275358","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275358","url":null,"abstract":"Adaptive indexing has been an area of active research in recent years. Its main concept is to create and maintain indexes adaptively and incrementally based on the incoming workload as a part of the query execution process. Database cracking is the first introduced applicable adaptive indexing paradigm. Despite the effectiveness and lightweight of database cracking, it offers slower lookups when it is compared to modern main memory index structures like adaptive radix tree (ART). ART is a recently proposed main-memory index structure which is designed to be space-efficient yet offers high performance by adapting its internal node size based on the count of keys stored in it. In this paper, we presented IBART (incremental branching adaptive radix tree), a hybrid indexing technique that takes the main concept of database cracking and applies it to ART, generating an adaptive index in terms of its creation and maintenance and also its internal nodes size. For systems of dynamic nature and unpredictable workload, IBART is proven to be more convenient than ART.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sub-Nyquist wideband spectrum sensing based on random demodulation in cognitive radio 认知无线电中基于随机解调的亚奈奎斯特宽带频谱感知
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275398
Marwa Mashhour, A. Hussein
{"title":"Sub-Nyquist wideband spectrum sensing based on random demodulation in cognitive radio","authors":"Marwa Mashhour, A. Hussein","doi":"10.1109/ICCES.2017.8275398","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275398","url":null,"abstract":"Cognitive radio (CR) has emerged as one of the most promising candidate solutions for improving spectrum utilization in next generation cellular networks. Spectrum sensing is a process used to detect the unused spectrum bands, holes, to enhance the utilization of scarce radio spectrum. Sampling rate is the bottleneck for spectrum sensing over multi-GHz bandwidth. Compressed sensing (CS) has been recently applied to reduce the sampling rate. In this paper, a wideband sub-Nyquist spectrum sensing architecture based on random demodulation is designed. A Simulink model of the random demodulator based spectrum sensing architecture is built and simulated on MATLAB to prove the system functionality. Implementation of an efficient high speed chipping sequence for the random demodulator is presented. The proposed chipping sequence architecture can operate at 2.27 GHz clock frequency in targeted technology of 130 nm with a speed up of 13.5% compared to previously published work. Moreover, a power-optimized architecture is implemented. The Orthogonal Matching Pursuit (OMP) which is one of the greedy iterative algorithms that is suitable for VLSI implementation is used for spectrum recovery.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High performance computing model for action localization in video 视频中动作定位的高性能计算模型
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275360
A. S. Elons, Magdy Abol-Ela
{"title":"High performance computing model for action localization in video","authors":"A. S. Elons, Magdy Abol-Ela","doi":"10.1109/ICCES.2017.8275360","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275360","url":null,"abstract":"Last decade, the field of High Performance Computing (HPC) has been rapidly developing. This advances in computational power and hardware resources motivated real-time video application. One of the most challenging application is “action detection” inside video. Beside its tremendous complication, it requires an intensive computation power for video analysis. This work extends our previous work in this problem by addressing both multi-core CPUs and Graphical Processing Unit (GPU) for implementing the video action localization system (previous work). In this paper, multiple (HPC) architectures are implemented to speedup real-time video streaming analytics. The experiments are conducted on the previously implemented recognition system which exploits Deep Learning models to localize an action inside a video. The results illustrates that CUDA implementation accomplished 8x speedup while CPU accomplished 5.2x speedup. The experiments were done on Sports-IM dataset with 487 action.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"1100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the mobility of data collectors in WSN 无线传感器网络中数据采集器的可移动性研究
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275290
A. S. Muhammad, Samy S. Soliman, Ashraf H. Badawi
{"title":"On the mobility of data collectors in WSN","authors":"A. S. Muhammad, Samy S. Soliman, Ashraf H. Badawi","doi":"10.1109/ICCES.2017.8275290","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275290","url":null,"abstract":"In wireless sensor networks, a data collector node seeks data collected from randomly deployed sensor nodes in a target area. These sensor nodes have a limited communication range to transmit/receive data, and hence can become isolated. It is then challenging to guarantee that the data collector receives the collected data from all sensors in the network while maintaining minimum energy consumption at the sensors as well as at the data collector itself. This challenge increases when the data collector node is mobile. This paper proposes algorithms with the objective of maximizing the amount of data collected by the mobile data collector (MDC) with maximum network lifetime. The proposed algorithms also address the problem of isolated nodes to guarantee all sensors' data is collected. Simulation results demonstrate that the proposed algorithms are efficient compared to the existing algorithms in terms of energy consumption, network lifetime and the amount of data collected by the data collector.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"24 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent agent for smart grid fault location isolation using Simulink 基于Simulink的智能电网故障定位隔离代理
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275368
Abdelrahman E. El-Ghareeb, Hamdy M. Mousa, A. El-Sisi
{"title":"Intelligent agent for smart grid fault location isolation using Simulink","authors":"Abdelrahman E. El-Ghareeb, Hamdy M. Mousa, A. El-Sisi","doi":"10.1109/ICCES.2017.8275368","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275368","url":null,"abstract":"In this paper, implementation of fault location isolation for self-healing power distribution system in smart grid using intelligent agent approach is presented. Self-healing grid is an important feature in smart grid. Distributed techniques that handle complexity of fault location isolation and service restoration algorithms eliminate centralized decision making and computational burden allowing faster response, which increase system reliability in an electric grid. For this reason, multi-agent system is one of the most suitable approaches for applying fault location isolation and service restoration algorithms. Every agent is configured to be fully autonomous and distributed having their design objective. A hierarchal architecture for multi-agent system is proposed for less communication burden. Every agent can communicate with neighbor agents within same level or a higher level parent agent. When fault occur, every zone agent read and exchange measured data with neighbor agents. Agent that observe a higher change in measured data will isolate fault and send isolated fault location to feeder agent for restoration decision process.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid model for cloud data security using steganography 使用隐写术的云数据安全混合模型
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275292
Moshira A. Ebrahim, I. El-Maddah, H. K. Mohamed
{"title":"Hybrid model for cloud data security using steganography","authors":"Moshira A. Ebrahim, I. El-Maddah, H. K. Mohamed","doi":"10.1109/ICCES.2017.8275292","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275292","url":null,"abstract":"Cloud computing combines a huge number of virtual resources and presents flexible service to users by pay-as-you-need concept. However, cloud computing has many advantages like resource sharing and conjunction; also still there are some problems such as data security which is one of the critical factors in cloud environment. This paper proposed security model to protect cloud data from unauthorized access using cryptography and steganography. This model consist of three phases, in the first phase we hash data using Secure Hash Algorithm (SHA), Then encrypt data using Advanced Encryption Standard (AES) algorithm and encrypt the hash code and the new key by Public key cryptography. Finally we use Least Significant Bit (LSB) steganography to embed all information after encryption in any type of images.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125123777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A smart voltage stability maneuver algorithm for voltage collapses mitigation 一种缓解电压崩溃的智能电压稳定机动算法
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275365
M. Usama, H. K. Mohamed, I. El-Maddah, M. A. Shedied
{"title":"A smart voltage stability maneuver algorithm for voltage collapses mitigation","authors":"M. Usama, H. K. Mohamed, I. El-Maddah, M. A. Shedied","doi":"10.1109/ICCES.2017.8275365","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275365","url":null,"abstract":"In the power system, the instantaneous and permanent stability is a major requirement cannot be overlooked. Because of the power grid large-scale systems, any disturbance anywhere on the power grid could pose a reason of overall dynamic imbalances. Major consequences could be occurred to the electricity feeding across wide areas of country which is called partial blackout, even entire country which is called overall blackout. It is perhaps for this reason that the existence voltage stability indices which indicate the power grid system stability level is very essential. With knowing the voltage stability level of the transmission lines that involves the power grid in real time (online operation), the voltage stability of the entire power grid could be obtained easily. There are several mathematical base voltage indices. But in this proposal, another voltage stability index will be build based on the machine learning techniques to mitigate the voltage collapse phenomenon. This novel predictor is proposed in transient stability analysis based on machine learning techniques such as (Linear regression, neural network, and Decision tree). This predictor is built after a comparison was made between the impacts of various machine learning algorithms using different datasets. Three different mathematical voltage stability indices (FVSI, Lmn, and NLSI) had been used to prepare datasets for the training purpose. An early warning system had been built based on the proposed predictor. This early warning system could be used to inform the system operator with the hazards of voltage instability issues face the electric power grid and visualize these hazards. The E.W.S had then been used as a kernel to build V.S.A.M.A (Voltage Stability Automatic Maneuver Algorithm) that can handle the voltage instability issue.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131619174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信