2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

筛选
英文 中文
A Novel Approach for Multi-Resource Planning in Construction Engineering 建筑工程中多资源规划的新方法
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014772
G. Maher, Osama Abd-El-Roaf, N. El-Hefnawy, Ahmed Kfafy
{"title":"A Novel Approach for Multi-Resource Planning in Construction Engineering","authors":"G. Maher, Osama Abd-El-Roaf, N. El-Hefnawy, Ahmed Kfafy","doi":"10.1109/ICICIS46948.2019.9014772","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014772","url":null,"abstract":"Resource planning is considered as an important factor for the success of construction projects. The main challenge in multi-project scheduling environment is represented by the limitation of resources. The optimum scheduling means the right time to allocate the available resources to activities of construction projects. This paper presents a new approach for solving multi-resource multiproject scheduling (MRMPS) problem in order to minimize total make-span of concurrently implemented projects. The developed approach generates the best scheduling based on a new combination of two priority rule, Maximum successors and minimum negative impact (MSMNI). The first priority rule allocates resources to activities based on maximum successors (MS) for candidate activities for increase the candidate activities in the next iteration of scheduling. This means, achieving maximum utilization of resources in each time period before departure to another time period. In second priority rule, we choose activity implementation according to the minimum negative impact (MNI) of implemented activity. A numerical example and experimental results show that the proposed approach is more efficient than previous approaches in the same field.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Key distribution protocol for Identity Hiding in MANETs manet中身份隐藏的密钥分配协议
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014807
Yomna Mohsen, M. Hamdy, E. Shaaban
{"title":"Key distribution protocol for Identity Hiding in MANETs","authors":"Yomna Mohsen, M. Hamdy, E. Shaaban","doi":"10.1109/ICICIS46948.2019.9014807","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014807","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are formed when a group of mobile nodes, communicate through wireless links in the absence of central administration. These features make them more vulnerable to several attacks like identity spoofing which leads to identity disclosure. Providing anonymity and privacy for identity are critical issues, especially when the size of such networks scales up. to avoid the centralization problem for key distribution in MANETs. This paper proposes a key distribution scheme for clustered ad-hoc networks. The network is divided into groups of clusters, and each cluster head is responsible for distributing periodically updated security keys among cluster members, for protecting privacy through encryption. Also, an authentication scheme is proposed to ensure the confidentiality of new members to the cluster. The simulation study proves the effectiveness of the proposed scheme in terms of availability and overhead. It scales well for high dense networks and gives less packet drop rate compared to its centralized counterpart in the presence of malicious nodes.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Hybrid (MD5 and RC4) Cryptography Algorithm Using Multi-Logic States 一种新的基于多逻辑状态的混合(MD5和RC4)密码算法
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014819
Suhad Muhaier Kareem, A. M. Rahma
{"title":"A New Hybrid (MD5 and RC4) Cryptography Algorithm Using Multi-Logic States","authors":"Suhad Muhaier Kareem, A. M. Rahma","doi":"10.1109/ICICIS46948.2019.9014819","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014819","url":null,"abstract":"In cryptography, the MD5 and RC4 algorithms are used in many applications to provide security. Both depend on two-state operations, such as XOR, for manipulating bits, and these operations are considered a weakness that can be vulnerable to attack. This paper presents a new hybrid of MD5 and RC4 based on a multi-logic states operation, called (E#), instead of XOR to increase the security level. This new (E#) uses three keys instead of one for controlling the variable block bits sizes of (1, 2, 4, and 8) bits and for determining the table numbers, which are formed from the addition in the Galois Field GF (2n) based on the block bit size for increasing the complexity of the proposed algorithm. This new hybrid algorithm leverages (E#) in both MD5 and RC4 and takes the output of the modified MD5 for use as the input key to RC4 increasing the security of RC4. The results are evaluated based on complexity, National Institute of Standards and Technology (NIST), histogram analysis, number of pixels of change rate (NPCR) and unified average changing intensity (UACI) and demonstrate that our modifications to both algorithms increase their complexity and security.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Evaluation of Service level Agreement for Service Providers in Mobile Edge Computing 移动边缘计算中服务提供商服务水平协议的信任评估
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014854
Merrihan B. Monir, T. Abdelkader, El-Sayed M. Ei-Horbaty
{"title":"Trust Evaluation of Service level Agreement for Service Providers in Mobile Edge Computing","authors":"Merrihan B. Monir, T. Abdelkader, El-Sayed M. Ei-Horbaty","doi":"10.1109/ICICIS46948.2019.9014854","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014854","url":null,"abstract":"Mobile edge computing (MEC) is regarded as the extension of cloud computing services to the network edge. However, due to the lack of experience between service users and service providers, users always doubt about the fulfilment and satisfaction of their needs. This paper proposes a trust evaluation scheme that evaluates the service provider compliance to the service level agreement, thus, indicating its trust status. On the other hand, dissatisfaction rates are being computed, to show the drawback aspect of each service provider. This helps future users to get acknowledged of service providers' past interactions prior dealing with them. Therefore, eliminating the probability of existing compromised service providers and raising the security of future interactions between service providers and users in the MEC environment. Simulation results show that the higher SLA compliance, the lower the value of the service dissatisfaction rate given.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123631358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Management of Smart Homes Considering Appliance Scheduling Flexibility 考虑设备调度灵活性的智能家居能源管理
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014687
S. M. Azzam, T. Elshabrawy, M. Ashour
{"title":"Energy Management of Smart Homes Considering Appliance Scheduling Flexibility","authors":"S. M. Azzam, T. Elshabrawy, M. Ashour","doi":"10.1109/ICICIS46948.2019.9014687","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014687","url":null,"abstract":"Home Energy Management (HEM) is considered a great potential for energy efficiency in smart grids. With the advent of advanced metering infrastructure (AMI), demand side management (DSM) become possible where households (HHs) change their consumption behavior in response to electricity time varying prices provided by the utility. An optimization algorithm for HEM considering appliance scheduling flexibility is proposed with the aim of electricity bill cost minimization. The appliance scheduling is done on weekly basis to be able to model a more realistic scenario which is able to shift the operation of some appliances that aren't required to operate daily throughout the week. The problem is formulated as a binary integer programming (BIP) problem. Single home scenario is considered in this work. Real time pricing (RTP) is considered to be the electricity pricing tariff that incentivize the users to adjust their energy consumption. The performance of the proposed algorithm is tested under different simulation scenarios. Results show the effectiveness of the algorithm in minimizing the electricity bill cost.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Moments Shape Descriptors and propose a new hybrid Descriptor technique 矩形描述子的比较研究,提出一种新的混合描述子技术
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014844
S. Hamandi, A. M. Rahma, R. Hassan
{"title":"Comparative Study of Moments Shape Descriptors and propose a new hybrid Descriptor technique","authors":"S. Hamandi, A. M. Rahma, R. Hassan","doi":"10.1109/ICICIS46948.2019.9014844","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014844","url":null,"abstract":"The shape is a significant visible feature of an object in images. Finding images by using shape features has gained much consideration. For precise computerized classification of the type of object in the image, different features extraction approaches may be used. To identify and determine the preferences among them, three different techniques are studied extensively and determined how it affected by the change which may happen to the different shapes with the proposal of a hybrid method that contains the robust descriptors of each technique which improves the results and provide strong features for shape description that achieves high accuracy reaching more than 90%.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine-learning discrimination: Bias in, bias out 机器学习歧视:入偏,出偏
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/icicis46948.2019.9014827
T. Calders
{"title":"Machine-learning discrimination: Bias in, bias out","authors":"T. Calders","doi":"10.1109/icicis46948.2019.9014827","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014827","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115517348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The cross-roads of algorithmic fairness, accountability and transparency in predictive analytics 预测分析中算法公平性、问责制和透明度的十字路口
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/icicis46948.2019.9014754
{"title":"The cross-roads of algorithmic fairness, accountability and transparency in predictive analytics","authors":"","doi":"10.1109/icicis46948.2019.9014754","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014754","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Symmetric and Asymmetric Single Circular Split Ring Microwave Sensor Using COMSOL Multiphysics 利用COMSOL多物理场设计对称和非对称单圆分裂环微波传感器
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014746
Sameh Sherif, M. Eldosoky, A. Soliman
{"title":"Design Symmetric and Asymmetric Single Circular Split Ring Microwave Sensor Using COMSOL Multiphysics","authors":"Sameh Sherif, M. Eldosoky, A. Soliman","doi":"10.1109/ICICIS46948.2019.9014746","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014746","url":null,"abstract":"Microwave sensors are very promising for sensing the biological medium with different advantages such as non-invasive and miniaturized dimensions. In this paper, the analysis of the change in the geometry parameters of a planar circular split microwave sensors for detecting and characterizing the dielectric properties of different materials is presented. The study is applied on two main types of sensors, a planar symmetrical split ring resonator (SSRR) and a planar Asymmetrical split ring resonator (ASRR). These sensors are used to investigate the difference in dielectric properties of the medium which affected the resonance frequency based on the perturbation theory. The results show a comprehensive study for the microwave sensor. It can be used in different application as a high sensitivity sensor to extract the difference among more matched materials in S-parameters. The mathematical model is developed for the accurate calculation of shifts in the resonant frequencies, transmission, and reflection coefficients S21 and S11 under loaded materials vs the change of sensor geometric and the orientation of the gap. The analysis and simulation are investigated using COMSOL Multiphysics tool.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling One-way and Two-way quantum key distribution protocols 建模单向和双向量子密钥分发协议
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) Pub Date : 2019-12-01 DOI: 10.1109/ICICIS46948.2019.9014729
A. M. Sofy, M. Shalaby, H. Dahshan, A. Rohiem
{"title":"Modeling One-way and Two-way quantum key distribution protocols","authors":"A. M. Sofy, M. Shalaby, H. Dahshan, A. Rohiem","doi":"10.1109/ICICIS46948.2019.9014729","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014729","url":null,"abstract":"The present cryptography systems security depends on the hardness of factorizing an integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor proposed a quantum procedure (Shor's algorithm) that easily factorizes large integer numbers to its prime factors compared with other algorithms. Consequently, present cryptography systems became endangered and once quantum computers exist, conventional cryptography systems could breakdown. On the other hand, quantum cryptography security is based on the well-known quantum mechanics uncertainty principle, and so the quantum cryptography enhances the cryptography field with a mechanism for eavesdropper detecting. Here, a hardware implementation was proposed for two types of key distribution protocols based on quantum computing, the one-way quantum key distribution protocol (BB84 protocol), and the two-way quantum key distribution protocol.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134121971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信