{"title":"Modeling and generation of detectors in artificial immune based network intrusion detection systems","authors":"H. Shahein, M. Ibrahim","doi":"10.1109/ICEEC.2004.1374431","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374431","url":null,"abstract":"In this paper, a novel model is built for detectors, used in network intrusion detection systems. The model works with a newly developed energy function, which is used in calculating the energies of detectors. An algorithm based on Genetic Algorithms, is developed for the generation of proposed detectors. This algorithm plus the model are tested over both synthetic and real data. Testing of attacks is based on the attacks present in the headers of the TCP/IP packets. Some real attacks have been simulated like WinNuke and Ping of death. For both the real and the synthetic cases, the results are illustratedfor a case ofjust less than 2% and 1% of false negatives.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Current-mode composite BiCMOS cells","authors":"N. Khachab","doi":"10.1109/ICEEC.2004.1374489","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374489","url":null,"abstract":"This paper presents Current-mode BiCMOS analog cells. These cells are simple, linear and may be used as basic building blocks in many analog circuits, such as multipliers.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mprove quality and efficiency of EDA software development","authors":"M. Ismail","doi":"10.1109/ICEEC.2004.1374449","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374449","url":null,"abstract":"It is essential for companies that develop software today to work on process improvement. However, determining the appropriate and realistic tasking of the process improvement is the key point. Measurements in sojiware organizations are an important source of control over quality and cost in software development. Software metrics are the measurement tools. Those meirics are meaningless without using their information in decisionmaking and improved organizational performance. Effective management of the Software Life Cycle is the key to successful software projects and it is a never-ending challenge. As a multi-national software company, we are targeting increase of productivity and product quality, and to decrease the response time to market. Based on the historical data, we figure out an appropriate estimate to each subtask in the project. Measuring actuals and comparing them with estimates is the tool to revisit our plans for tracking the progress in the project and update them ifneeded. Index Terms Software metrics programs, software development, measurement programs, software engineering.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The performance of an efficient zero-knowledge identification scheme","authors":"A. Allam, I. I. Ibrahim, I. Ali, A.E.H. Elsawy","doi":"10.1109/ICEEC.2004.1374429","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374429","url":null,"abstract":"Fiat and Shamir have proposed to use ZeroKnowledge interactive proofs to obtain secure identification mechanisms. Zero-Knowledge protocols are designed to address the identification service, by allowing a prover to demonstrate knowledge of a secret while revealing no information to be use by the verifier to convey the demonstration of knowledge to others. The invention of an efficient Zero-Knowledge identification scheme has provided anther public-key cryptosystem besides the renowned Fiat-Shamir scheme, for which in addition to the identification feature both key exchange and mutual identification are available. The availability of the elliptic curve discrete logarithm problem made the invented scheme very efficient. The purpose of this paper is to show the security level performance of our scheme and show its ability to resist the brute-force attack of an unauthorized prover.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M.A. Abu-Elsoud, F. Abou-Chadi, A. M. Amin, M. Mahana
{"title":"Classification of seismic events in suez gulf area, egypt using artificial neural network","authors":"M.A. Abu-Elsoud, F. Abou-Chadi, A. M. Amin, M. Mahana","doi":"10.1109/ICEEC.2004.1374460","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374460","url":null,"abstract":"An automatic system has been developed to classijj the seismic events in the Suez Gulf area, Egypt. The system is based on Artificial Neural Network (ANN) and is composed of two modules; extracting a set of features that quantifies the seismogram signatures using Linear Predication Code (LPC) and a classifer to discriminate the seismic events The data used are a set of 320 seismic recorded by Egyptian National Seismic Network (ENSN); 142 records are explosions and 178 are local earthquakes. n e classification results have shown that the suggested system is eficient it provides a correct classijcation performance of 93.7%.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent model for mitigating the attack effects","authors":"Tarek S. Sobh, Essam M. Hamed","doi":"10.1109/ICEEC.2004.1374411","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374411","url":null,"abstract":"IP spoofing enables the network attackers to hide their identity while the IP traceback allows victim to identi3 the origin of attackers. Many IP traceback techniques are suggested such as ICMP trace messages, Probabilistic Packet Marking, Hash-based IP Traceback, etc. The aim of this work is topresent an Intelligent Packet Filtering for defending against both the network Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks. In addition, the proposed model introduces active response mechanism for taking rapid action against attacker. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. Also, this paper presents within the proposed model a tracing approach based on the packet marking.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133507213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passim: a fast simulator for passive /spl Delta//spl Sigma/ ADC and passive switched-C filters","authors":"E. Hegazi, R. Yousry","doi":"10.1109/ICEEC.2004.1374504","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374504","url":null,"abstract":"We report on a fast simulator for passive delta sigma analog-to-digital converters and general passive filters. An algorithm that relies on discrete time circuit partitioning is devised to reduce simulation time. Test cases include a complete passive δΣADC that meets the specification of GSM, Bluetooth and WCDMA.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132856447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronisation of high performance reluctance motors by increasing the supply frequency","authors":"F. N. Abdelbar, N. Ahmed, E. Ali","doi":"10.1109/ICEEC.2004.1374609","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374609","url":null,"abstract":"This paper presents a new technique for starting a high performance reluctance motors which cannot pull into step at normal operating condition. The proposed technique based on starting of the reluctance motor al frequency higher than the normal frequency. \u0000At the instant that the rotor speed reaches the synchronous speed of normal frequency. The main aim of the paper is starting and pulling into step of reluctance motor while keeping the desired performance without changing the motor parameter and design.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121996438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Abd-El-Aziz, A.A. AdIy, E.-E.-D.M. Abou-EI-Zahab
{"title":"Assessment of electromagnetic forces resulting from arbitrary geometrical busbar configurations","authors":"M. Abd-El-Aziz, A.A. AdIy, E.-E.-D.M. Abou-EI-Zahab","doi":"10.1109/ICEEC.2004.1374593","DOIUrl":"https://doi.org/10.1109/ICEEC.2004.1374593","url":null,"abstract":"Computation of forces to which busbars are subjected, both in normal and transient situations, have always been an important issue in order to provide sufficient clamping mechanisms and/or suggest suitable inter-busbar spacing criteria. This paper presents an analytical approach using which forces and force densities acting on busbars may be computed. Details of the approach and sample numerical simulations are given in the paper.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}