{"title":"Performance analysis of secure communications over α-μ/κ-μ fading channels","authors":"J. M. Moualeu, W. Hamouda","doi":"10.1109/ICCES.2017.8275354","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275354","url":null,"abstract":"In this paper, the performance for physical-layer (PHY) security of a wireless communication system in mixed α-μ and κ-μ fading channels is analyzed. The system under consideration consists of a transmitter and a legitimate receiver in the presence of an eavesdropper, wherein the main channel is subject to α -μ fading while the wiretap channel undergoes κ-μ fading. We assume that the legitimate users and the eavesdropper are equipped with a single antenna. We derive a novel analytical expression for the lower bound of secure outage probability (SOP). Next, we investigate the asymptotic behavior of the SOP for high signal-to-noise ratio (SNR) of the main channel. Finally, we provide Monte-Carlo simulations to verify our proposed analytical framework.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal placement of access points for indoor positioning using a genetic algorithm","authors":"Hassan Eldeeb, M. Arafa, M. Saidahmed","doi":"10.1109/ICCES.2017.8275323","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275323","url":null,"abstract":"Currently, building accurate indoor positioning systems is a crucial challenge facing scientific researchers. One of the most effective metrics that increases positioning accuracy is the placement of access points (APs) in the service area. In this paper, we propose a genetic algorithm based framework, GenoPlacement, to solve APs placement problem. GenoPlacement handles different types of building walls such as concrete, brick, and glass. Our objective is to find an APs setup with unique fingerprints at each signal test point (STP) while maximizing diversity among these fingerprints. To evaluate GenoPlacement, we compare the proposed objective function with the traditional one which maximizes the received signal strength at each STP. Then, we compare GenoPlacement with two nominated approaches. The results confirm that building indoor positioning system considering the optimal places of APs decreases the positioning error down to four meters at 90% precision.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Reyad, M. Mofaddel, W. Abd-Elhafiez, Mohamed Fathy
{"title":"A novel image encryption scheme based on different block sizes for grayscale and color images","authors":"O. Reyad, M. Mofaddel, W. Abd-Elhafiez, Mohamed Fathy","doi":"10.1109/ICCES.2017.8275351","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275351","url":null,"abstract":"In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension (2D) input image is divided into various blocks of size N × N. Each plainimage block is transformed into a one dimensional (1D) array using the Zigzag pattern mode. Then, the exclusive or (XOR) logical operation is used to encrypt each block with the analogous secret key. In the second scheme, after the transformation process, the first block of each image is encrypted by the corresponding secret key. Then, before the next block is encrypted, it is XORed with the first encrypted block to become the next input to the encrypting routine and so on. This feedback mechanism depends on the cipher block chaining (CBC) mode of operation which considers the heart of some ciphers because it is highly nonlinear. In the case of color images, the color component is separated into blocks with the same size and different secret keys. The used secret key sequences are generated from elliptic curves (EC) over a binary finite field F2™. Finally, the experimental results are carried out and security analysis of the ciphered images are demonstrated that the two proposed schemes had a better performance in terms of security, sensitivity and robustness.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis technique for improving delay factor of carry select adder using FPGA","authors":"Basma Khater, Mahmoud Alshewimy, M. Saidahmed","doi":"10.1109/ICCES.2017.8275269","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275269","url":null,"abstract":"This paper introduces Field Programmable Gate Array (FPGA) model of modified Carry Select Adder (CSLA) for enhancing conventional CSLA speed based on its performance analysis. The delay factor has been improved by using other adders' blocks and common logic blocks instead of Ripple Carry Adder (RCA) blocks used in conventional CSLA. Modifying CSLA architecture at a fundamental level is an advantageous concept that sets FPGA based adder models apart from rigid-architecture conventional adders. This paper introduces also design and synthesis of one-level and two-level modified CSLA and the obtained results show some improvements in the time delay (T) by about 44.7% and in the area (A) by about 15.1% in comparison with conventional CSLA performance. It is also shown that the two-level modified CSLA with Brent-Kung Adder (BKA) introduces some significant improvement in the performance in terms of AT and AT2 products.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Viterbi decoding of reed-muller codes","authors":"A. Mahran, A. Magdy, A. Elghandour","doi":"10.1109/icces.2017.8275324","DOIUrl":"https://doi.org/10.1109/icces.2017.8275324","url":null,"abstract":"For years Viterbi algorithm is considered one of the most efficient decoding algorithm for decoding trellis based Reed-Muller codes. As a result of the nature of the trellis structure of block codes, the number of eliminated branches is far less than that eliminated in convolutional codes. This paper adopts the use of an adaptive Viterbi algorithm to Reed-Muller codes such that branch elimination can take place not only at merging states but also at any trellis level. The used adaptive algorithm not only preserves the error performance, but also can achieve significant complexity reduction for both hard decision decoding and soft decision decoding.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective robotic swarm communication using WiMax technology","authors":"M. Abbas","doi":"10.1109/ICCES.2017.8275314","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275314","url":null,"abstract":"Swarm robots are characterized by its ability to perform a number of operations distributed in order to reach a single goal. So they need to communicate continuously and effectively. However, one of the most common obstacles facing these robots is the environment in which they work. It is possible that the common goal is widely distributed and in difficult places where communication is difficult. So the aim of the research is to use a modern technology that enables the squadrons to communicate at long distances. WiMAX changed into deliberate because of its numerous merits, collectively with its functionality to kilometers. Four factors were then analyzed to measure performance through data transmission through audio, video and e-mail as well as searching through browsing. The consequences indicated that performance reached excessive degrees beneath particular obstacles. WiMax generation demonstrates its capability to enhance the performance of both upload response time and download response time and lowering both of the traffic received and traffic sent between robots.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hardware design and implementation for accelerating motion detection using (System On Chip) SOC","authors":"A. Khalil, M. Shalaby, E. Hegazi","doi":"10.1109/ICCES.2017.8275343","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275343","url":null,"abstract":"Motion detection is a key role in video surveillance, as a result of using a high-resolution camera in motion detection which produces a high definition video streaming, it's difficult to process this huge amount of data in real time on a serial processor. System on chip (SOC) addressed this problem by combining FPGA and serial processor on one chip that can be used to develop a complex heterogeneous system. Therefore, we can use the power of FPGA parallel processing technique in accelerating the image processing algorithms. In this paper, we present a hardware design and implementation for accelerating motion detection and optimizing the FPGA resources. The experimental result of this design is presented and detailed.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126259999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental black-box dynamic modelling of a Flexible Manoeuvring System","authors":"M. Moness, Tarek Diaa-Eldeen","doi":"10.1109/ICCES.2017.8275315","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275315","url":null,"abstract":"Flexible Manoeuvring Systems (FMS) have been recently used in a wide range of applications. This paper addresses the problem of modeling the Twin Rotor Multi-Input Multi-Output System (TRMS) as one of the most significant issues in FMS control. In spite of their advantageous characteristics, modeling a Multi-Input Multi-Output (MIMO) FMS is considered a challenging engineering problem. In this work, a black-box modeling approach is introduced with the objective of obtaining an accurate model representation for the TRMS. Experiments are established in a real-time lab-scale helicopter system, TRMS, and input/output datasets are registered for further off-line computations. Obtained models are validated in both time and frequency domains and results have been investigated in details. Then a comparative study between different modelling methodologies applied to the problem of the TRMS modelling is introduced and results showed significant advantages in the introduced modelling approach against other approaches.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129002011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing sports image search and retrieval using multi-modality ontology","authors":"Yomna Hatem, R. Ismail, S. Rady, K. Bahnasy","doi":"10.1109/ICCES.2017.8275328","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275328","url":null,"abstract":"Extracting knowledge from multimedia contents represents recently a big challenge. Organizing and analyzing multimedia collections requires specific tools for extracting knowledge from the contents to enable effective and efficient filtering, searching and retrieval. The use of knowledge models, such as Ontology, is gaining interest among multimedia retrieval researches. This paper builds and integrates a multi-modality ontology to the conventional image annotation and retrieval methodology. The proposed knowledge-model integration highly improves the searching process. Two ontologies are proposed, domain and visual description ontologies. Experiments have demonstrated the efficiency of the proposed multi-modality ontology method when compared against the classical retrieval technique. The results show that using ontologies increases the performance to reach 1, 0.91 and 0.94 for Precision, Recall and F-measure respectively.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing privacy issues, challenges and solutions","authors":"Ayman M. El-Zoghby, Marianne A. Azer","doi":"10.1109/ICCES.2017.8275295","DOIUrl":"https://doi.org/10.1109/ICCES.2017.8275295","url":null,"abstract":"There are many cloud computing initiatives that represent a lot of benefit to enterprise customers. However, there are a lot of challenges and concerns regarding the security and the privacy of the customer data that is hosted on the cloud. We explore in this paper the various aspects of cloud computing regarding data life cycle and its security and privacy challenges along with the devised methodology to address those challenges. We mention some of the regulations and law requirements in place to ensure cloud customer data privacy.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124498127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}