{"title":"Design of Edge-Coupled Microstrip Patches Filtenna","authors":"G. Mansour, P. Hall","doi":"10.1145/3410352.3410732","DOIUrl":"https://doi.org/10.1145/3410352.3410732","url":null,"abstract":"A microwave structure that combines filtering and radiating functions is presented. The structure consists of three patches, two of which are aperture-fed, printed on stacked substrates. The array can be considered as three-pole edge-coupled filter with radiating resonators. It can also be viewed as a two-port array antenna with frequency domain filtering capability. The array was designed to operate as three-pole band-pass filter with a fractional bandwidth of 5% at a midband frequency of 2.0 GHz. The proposed structure was simulated using CST (Computer Simulation Technology) software package and measured using HP8722D vector network analyzer. The structure exhibits filter-like frequency response with three reflection zeros observed in the return loss result. The measured and simulated 3- dB bandwidths are 117 and 130 MHz respectively. The structure also provides a well-shaped radiation pattern and good gain within the operating band.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114274298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. A. Younis, K. Kifayat, Qi Shi, Ellie Matthews, Gage Griffiths, Rene Lambertse
{"title":"Teaching Cryptography Using CYPHER (InteraCtive CrYPtograpHic Protocol TEaching and LeaRning)","authors":"Y. A. Younis, K. Kifayat, Qi Shi, Ellie Matthews, Gage Griffiths, Rene Lambertse","doi":"10.1145/3410352.3410742","DOIUrl":"https://doi.org/10.1145/3410352.3410742","url":null,"abstract":"The lack of cryptographic knowledge is one factor contributing to the cybersecurity skills gap. Cryptography is the core of the research in data security and a fundamental component in information assurance yet complex topic, with its purpose to conceal and authenticate information. Hence, teaching cryptography-based security protocols in an effective and engaging manner is a challenging problem throughout international HE sectors. With explanations usually based around mathematical notations, it can be a daunting and difficult subject for many students. This point is emphasized by the consistently lower marks achieved, in comparison to other course modules. To combat this, we propose the CYPHER platform, which delivers a motivating and engaging practical element to teaching and learning popular cryptographic protocols. It customizes a real-world scenarios that are illustrated by animation videos to depict and simplify a number of well-known cryptographic protocols. CYPHER provides an interactive learning experience, allowing the breakdown of complex topics to a level understood by each student. By providing assessment gamification, the delivered knowledge will be assessed in a fun way by playing a game to pass a number of stages and measure the level of understanding. The analysis of the evaluations' results showed that over 88% of the students surveyed had found the CYPHER platform increased the overall speed of understanding.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and Practical Evaluation of Volatge Regualtion for DC-DC Conveters Controlled by Model Predictive Controller","authors":"Aynour Aldarragi, Fatma Elkailany, Adel Mohamed, Mawia Elgazzar","doi":"10.1145/3410352.3410804","DOIUrl":"https://doi.org/10.1145/3410352.3410804","url":null,"abstract":"The DC/DC converter is in charge of achieving constant output in the renewable energy systems in the most effective way. This paper investigates the performance of Buck DC/DC and the advanced DC/DC luo converter with Model Predictive Control (MPC) in solar energy system. MPC is the most widely used of al advanced methodologies in industrial application. The system has been implemented practically and validates using MATLAB/SIMULINK. A simulation has been carried out with hardware interface toolbox. In addition, a comparison between the simulation and practical results, have been presented. The results show stable operational performance under different conditions and the output voltage has been regulated even for the advanced DC Luo converter.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126815535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contour analysis of external images","authors":"R. Uskenbayeva, S. Mukhanov","doi":"10.1145/3410352.3410811","DOIUrl":"https://doi.org/10.1145/3410352.3410811","url":null,"abstract":"Image recognition occupies a special place in the science of computer vision. Contour analysis particular important in pattern recognition. In this paper, we consider the structure of the contour analysis of external images. Active contour method shows the possibilities of using the minimum energy curve. The energy function that defines boundaries without first isolating the boundaries of an image object. Therefore, the Canny Boundary Detector algorithm is used to detect the contours of an object in an image. This algorithm smooths out image blur and eliminates noise, eliminates errors or interference in the picture. The path tracking method crosses out the boundaries between the subject and the background. Algorithms such as machine learning are needed in order to reflect its performance and the need for recognition. Clustering is used as a machine learning method to find the nearest neighbor criteria. The mathematical model of clustering has its own uniqueness and application for identifying borders or contours in the image. The contour detection and linking approach uses graph analysis, which works and does not lose efficiency in the presence of noise. The convexity defects contour analysis algorithm is able to determine the size of borders, and also uses the search for contour recesses and the introduction of key features when calculating object parameters.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation in Thyristor-Controlled Reactor (TCR)","authors":"A. Moftah, Zakariya Rajab, I. Ighneiwa","doi":"10.1145/3410352.3410795","DOIUrl":"https://doi.org/10.1145/3410352.3410795","url":null,"abstract":"The paper studies the single phase Thyristor-Controlled Reactor (TCR) which is one the important applications of thyristors (Silicon-Controlled Rectifier, SCR). The TCR is mainly used as a reactive power compensator. The paper also presents experimental results and theoretical calculations of the TCR circuit. At various firing angle of the thyristors, the experimental results include the thyristor current, reactor current, RMS values of the power supply, current and voltage harmonics are plotted and tabulated. The relative results of the TCR system are also compared and discussed.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using of Machine Learning algorithm and Spectral method for simulation of Nonlinear Wave Equation","authors":"M. Nurtas, Ydyrys Aizhan, Altaibek Aizhan","doi":"10.1145/3410352.3410778","DOIUrl":"https://doi.org/10.1145/3410352.3410778","url":null,"abstract":"This article is devoted to the description of a nonlinear partial differential equation, known as the Korteweg-de Vries equation (KdV) [1]-[3]. To solve this equation numerically, we used a spectral method using a fast Fourier transform. In conclusion, we compared the numerical solution using the spectral method and the solution using machine learning.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Protein Synthesis and DNA Mutations using Finite State Machines","authors":"Salma A. O. Mohammed, Ashraf Ali Bourawy","doi":"10.1145/3410352.3410773","DOIUrl":"https://doi.org/10.1145/3410352.3410773","url":null,"abstract":"In molecular biology, protein is the most significant product of the gene expression process, which is generated by utilizing the genetic information of the DNA molecules. Based on the Central Dogma of molecular biology, proteins are synthesized by first transcribing a DNA gene, which produces mRNA molecules. This mRNA is then translated to produce the desired protein product. Finite state machine (FSM) is a distinguishable tool for modeling discrete event systems. In this paper, we introduce an FSM model for protein synthesis. We further incorporate a mechanism for mutation analysis to our FSM model that helps in determining effects on protein synthesis. The proposed model has been validated by feeding the FSM model with DNA strands. Results have shown and proven that the model mimics and produces protein products as described by the steps of Central Dogma. Furthermore, the FSM model succeeds in discovering gene mutations and consequently determining mutation type.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Amanzholova, Nurbek Tastan, Kamila Kalkamanova, Amina Yessenalina
{"title":"Valid and Invalid Bitcoin Transactions","authors":"S. Amanzholova, Nurbek Tastan, Kamila Kalkamanova, Amina Yessenalina","doi":"10.1145/3410352.3410736","DOIUrl":"https://doi.org/10.1145/3410352.3410736","url":null,"abstract":"In this paper, we describe valid and invalid bitcoin transactions. Bitcoin is one of the most widespread currencies in the network, which can be used to perform purchases and transactions among nodes. Because of its digital feature, it can undergo some problems and attacks such as double spending (DS), Denial of Service(DoS), packet sniffing and so on. One of the most common challenges is double spending. DS implies spending a balance of given cryptocurrency more than once, viably making a difference between the spending record and the sum of available cryptocurrency. It is suggested that it can be prevented by including Timestamp server, which adds precise time data that is never repetitive. In this paper, the given solution was implemented using Java platform. The experiment results show the progress in preventing DS of bitcoin as soon as we connected the TSA server.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Recognition based on Histogram Equalization and Discrete Cosine Transform","authors":"Amina A. Abdo, A. Lawgali, A. K. Zohdy","doi":"10.1145/3410352.3410758","DOIUrl":"https://doi.org/10.1145/3410352.3410758","url":null,"abstract":"One of the most efficient and evolving methods in biometric identification is the iris recognition as the human iris has a unique texture, which represents a verity of details. This paper presents a technique based on histogram equalization and Discrete Cosine Transform (DCT) to capture the discriminative features of iris image. In order to investigate the performance of the proposed technique, Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP) have been implemented and compared their effectiveness to capture the features with Discrete Cosine Transform. This approach is applied on CASIA interval-v4 database. The results indicate significant achievement in iris recognition accuracies by using DCT compared with DWT and LBP.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121579160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed. S. Elselini, Hamed. R. Eleribi, Mahdi Sanaani, Abdelhakim Alwerfalli
{"title":"A Performance Study of an IoT System Using LoRa Access Network Technology","authors":"Ahmed. S. Elselini, Hamed. R. Eleribi, Mahdi Sanaani, Abdelhakim Alwerfalli","doi":"10.1145/3410352.3410807","DOIUrl":"https://doi.org/10.1145/3410352.3410807","url":null,"abstract":"In the field of communications and networks, companies and developers are always developing the structure of communication networks and Internet networks, and they look forward for delivering information to the customer with the best quality (without errors) and as fast as possible, we have noticed over time that communications and networks are always evolving from first generation to The fifth generation, and this development was moving more and more to rely on the Internet in daily life, where the Internet offers customers many services supervised by many companies, including (e-mail, social networking sites, sales and purchases) and Also the process of linking most Devices and various equipment to each other, where they exchange information and messages between them without the need for human intervention, This is known as the Internet of Things, which has become the focus of attention of companies and developers in the world of technology in recent years, which is the direction of most development projects in the coming years, and with the growing interest in the Internet of Things different types of techniques for linking and communication between things has emerged, such technologies LoRa-LoRaWAN technology, a wireless technology used in the Internet of things where characterized by the use of low levels of power and give a large coverage area, which mean covering more geographically spanned devices, and that's what this paper focuses on. By testing and evaluating this technology in terms of coverage and efficiency under different conditions, namely in urban and suburban areas, and then comparing and finding the best conditions in which this technique works with high efficiency, and also can guarantee a reliable service.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122095541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}