2017 12th International Conference on Computer Engineering and Systems (ICCES)最新文献

筛选
英文 中文
Performance analysis of secure communications over α-μ/κ-μ fading channels α-μ/κ-μ衰落信道安全通信性能分析
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275354
J. M. Moualeu, W. Hamouda
{"title":"Performance analysis of secure communications over α-μ/κ-μ fading channels","authors":"J. M. Moualeu, W. Hamouda","doi":"10.1109/ICCES.2017.8275354","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275354","url":null,"abstract":"In this paper, the performance for physical-layer (PHY) security of a wireless communication system in mixed α-μ and κ-μ fading channels is analyzed. The system under consideration consists of a transmitter and a legitimate receiver in the presence of an eavesdropper, wherein the main channel is subject to α -μ fading while the wiretap channel undergoes κ-μ fading. We assume that the legitimate users and the eavesdropper are equipped with a single antenna. We derive a novel analytical expression for the lower bound of secure outage probability (SOP). Next, we investigate the asymptotic behavior of the SOP for high signal-to-noise ratio (SNR) of the main channel. Finally, we provide Monte-Carlo simulations to verify our proposed analytical framework.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal placement of access points for indoor positioning using a genetic algorithm 使用遗传算法的室内定位接入点的最佳放置
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275323
Hassan Eldeeb, M. Arafa, M. Saidahmed
{"title":"Optimal placement of access points for indoor positioning using a genetic algorithm","authors":"Hassan Eldeeb, M. Arafa, M. Saidahmed","doi":"10.1109/ICCES.2017.8275323","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275323","url":null,"abstract":"Currently, building accurate indoor positioning systems is a crucial challenge facing scientific researchers. One of the most effective metrics that increases positioning accuracy is the placement of access points (APs) in the service area. In this paper, we propose a genetic algorithm based framework, GenoPlacement, to solve APs placement problem. GenoPlacement handles different types of building walls such as concrete, brick, and glass. Our objective is to find an APs setup with unique fingerprints at each signal test point (STP) while maximizing diversity among these fingerprints. To evaluate GenoPlacement, we compare the proposed objective function with the traditional one which maximizes the received signal strength at each STP. Then, we compare GenoPlacement with two nominated approaches. The results confirm that building indoor positioning system considering the optimal places of APs decreases the positioning error down to four meters at 90% precision.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A novel image encryption scheme based on different block sizes for grayscale and color images 一种基于不同块大小的灰度和彩色图像加密方案
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275351
O. Reyad, M. Mofaddel, W. Abd-Elhafiez, Mohamed Fathy
{"title":"A novel image encryption scheme based on different block sizes for grayscale and color images","authors":"O. Reyad, M. Mofaddel, W. Abd-Elhafiez, Mohamed Fathy","doi":"10.1109/ICCES.2017.8275351","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275351","url":null,"abstract":"In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension (2D) input image is divided into various blocks of size N × N. Each plainimage block is transformed into a one dimensional (1D) array using the Zigzag pattern mode. Then, the exclusive or (XOR) logical operation is used to encrypt each block with the analogous secret key. In the second scheme, after the transformation process, the first block of each image is encrypted by the corresponding secret key. Then, before the next block is encrypted, it is XORed with the first encrypted block to become the next input to the encrypting routine and so on. This feedback mechanism depends on the cipher block chaining (CBC) mode of operation which considers the heart of some ciphers because it is highly nonlinear. In the case of color images, the color component is separated into blocks with the same size and different secret keys. The used secret key sequences are generated from elliptic curves (EC) over a binary finite field F2™. Finally, the experimental results are carried out and security analysis of the ciphered images are demonstrated that the two proposed schemes had a better performance in terms of security, sensitivity and robustness.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An analysis technique for improving delay factor of carry select adder using FPGA 利用FPGA提高进位选择加法器延迟系数的分析技术
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275269
Basma Khater, Mahmoud Alshewimy, M. Saidahmed
{"title":"An analysis technique for improving delay factor of carry select adder using FPGA","authors":"Basma Khater, Mahmoud Alshewimy, M. Saidahmed","doi":"10.1109/ICCES.2017.8275269","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275269","url":null,"abstract":"This paper introduces Field Programmable Gate Array (FPGA) model of modified Carry Select Adder (CSLA) for enhancing conventional CSLA speed based on its performance analysis. The delay factor has been improved by using other adders' blocks and common logic blocks instead of Ripple Carry Adder (RCA) blocks used in conventional CSLA. Modifying CSLA architecture at a fundamental level is an advantageous concept that sets FPGA based adder models apart from rigid-architecture conventional adders. This paper introduces also design and synthesis of one-level and two-level modified CSLA and the obtained results show some improvements in the time delay (T) by about 44.7% and in the area (A) by about 15.1% in comparison with conventional CSLA performance. It is also shown that the two-level modified CSLA with Brent-Kung Adder (BKA) introduces some significant improvement in the performance in terms of AT and AT2 products.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Viterbi decoding of reed-muller codes reed-muller码的自适应Viterbi译码
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/icces.2017.8275324
A. Mahran, A. Magdy, A. Elghandour
{"title":"Adaptive Viterbi decoding of reed-muller codes","authors":"A. Mahran, A. Magdy, A. Elghandour","doi":"10.1109/icces.2017.8275324","DOIUrl":"https://doi.org/10.1109/icces.2017.8275324","url":null,"abstract":"For years Viterbi algorithm is considered one of the most efficient decoding algorithm for decoding trellis based Reed-Muller codes. As a result of the nature of the trellis structure of block codes, the number of eliminated branches is far less than that eliminated in convolutional codes. This paper adopts the use of an adaptive Viterbi algorithm to Reed-Muller codes such that branch elimination can take place not only at merging states but also at any trellis level. The used adaptive algorithm not only preserves the error performance, but also can achieve significant complexity reduction for both hard decision decoding and soft decision decoding.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effective robotic swarm communication using WiMax technology 利用WiMax技术进行有效的机器人群通信
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275314
M. Abbas
{"title":"Effective robotic swarm communication using WiMax technology","authors":"M. Abbas","doi":"10.1109/ICCES.2017.8275314","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275314","url":null,"abstract":"Swarm robots are characterized by its ability to perform a number of operations distributed in order to reach a single goal. So they need to communicate continuously and effectively. However, one of the most common obstacles facing these robots is the environment in which they work. It is possible that the common goal is widely distributed and in difficult places where communication is difficult. So the aim of the research is to use a modern technology that enables the squadrons to communicate at long distances. WiMAX changed into deliberate because of its numerous merits, collectively with its functionality to kilometers. Four factors were then analyzed to measure performance through data transmission through audio, video and e-mail as well as searching through browsing. The consequences indicated that performance reached excessive degrees beneath particular obstacles. WiMax generation demonstrates its capability to enhance the performance of both upload response time and download response time and lowering both of the traffic received and traffic sent between robots.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hardware design and implementation for accelerating motion detection using (System On Chip) SOC 使用片上系统(System On Chip) SOC加速运动检测的硬件设计与实现
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275343
A. Khalil, M. Shalaby, E. Hegazi
{"title":"A hardware design and implementation for accelerating motion detection using (System On Chip) SOC","authors":"A. Khalil, M. Shalaby, E. Hegazi","doi":"10.1109/ICCES.2017.8275343","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275343","url":null,"abstract":"Motion detection is a key role in video surveillance, as a result of using a high-resolution camera in motion detection which produces a high definition video streaming, it's difficult to process this huge amount of data in real time on a serial processor. System on chip (SOC) addressed this problem by combining FPGA and serial processor on one chip that can be used to develop a complex heterogeneous system. Therefore, we can use the power of FPGA parallel processing technique in accelerating the image processing algorithms. In this paper, we present a hardware design and implementation for accelerating motion detection and optimizing the FPGA resources. The experimental result of this design is presented and detailed.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126259999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental black-box dynamic modelling of a Flexible Manoeuvring System 柔性机动系统的实验黑箱动力学建模
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275315
M. Moness, Tarek Diaa-Eldeen
{"title":"Experimental black-box dynamic modelling of a Flexible Manoeuvring System","authors":"M. Moness, Tarek Diaa-Eldeen","doi":"10.1109/ICCES.2017.8275315","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275315","url":null,"abstract":"Flexible Manoeuvring Systems (FMS) have been recently used in a wide range of applications. This paper addresses the problem of modeling the Twin Rotor Multi-Input Multi-Output System (TRMS) as one of the most significant issues in FMS control. In spite of their advantageous characteristics, modeling a Multi-Input Multi-Output (MIMO) FMS is considered a challenging engineering problem. In this work, a black-box modeling approach is introduced with the objective of obtaining an accurate model representation for the TRMS. Experiments are established in a real-time lab-scale helicopter system, TRMS, and input/output datasets are registered for further off-line computations. Obtained models are validated in both time and frequency domains and results have been investigated in details. Then a comparative study between different modelling methodologies applied to the problem of the TRMS modelling is introduced and results showed significant advantages in the introduced modelling approach against other approaches.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129002011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing sports image search and retrieval using multi-modality ontology 利用多模态本体增强运动图像检索
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275328
Yomna Hatem, R. Ismail, S. Rady, K. Bahnasy
{"title":"Enhancing sports image search and retrieval using multi-modality ontology","authors":"Yomna Hatem, R. Ismail, S. Rady, K. Bahnasy","doi":"10.1109/ICCES.2017.8275328","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275328","url":null,"abstract":"Extracting knowledge from multimedia contents represents recently a big challenge. Organizing and analyzing multimedia collections requires specific tools for extracting knowledge from the contents to enable effective and efficient filtering, searching and retrieval. The use of knowledge models, such as Ontology, is gaining interest among multimedia retrieval researches. This paper builds and integrates a multi-modality ontology to the conventional image annotation and retrieval methodology. The proposed knowledge-model integration highly improves the searching process. Two ontologies are proposed, domain and visual description ontologies. Experiments have demonstrated the efficiency of the proposed multi-modality ontology method when compared against the classical retrieval technique. The results show that using ontologies increases the performance to reach 1, 0.91 and 0.94 for Precision, Recall and F-measure respectively.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud computing privacy issues, challenges and solutions 云计算隐私问题、挑战和解决方案
2017 12th International Conference on Computer Engineering and Systems (ICCES) Pub Date : 2017-12-01 DOI: 10.1109/ICCES.2017.8275295
Ayman M. El-Zoghby, Marianne A. Azer
{"title":"Cloud computing privacy issues, challenges and solutions","authors":"Ayman M. El-Zoghby, Marianne A. Azer","doi":"10.1109/ICCES.2017.8275295","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275295","url":null,"abstract":"There are many cloud computing initiatives that represent a lot of benefit to enterprise customers. However, there are a lot of challenges and concerns regarding the security and the privacy of the customer data that is hosted on the cloud. We explore in this paper the various aspects of cloud computing regarding data life cycle and its security and privacy challenges along with the devised methodology to address those challenges. We mention some of the regulations and law requirements in place to ensure cloud customer data privacy.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124498127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信