2015 Tenth International Conference on Computer Engineering & Systems (ICCES)最新文献

筛选
英文 中文
Performance comparison of linear multiuser detectors and neural network detector for DS/CDMA systems in AWGN AWGN中DS/CDMA系统线性多用户检测器与神经网络检测器的性能比较
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393065
Hassan A. Hassan, M. Essai, A. Yahya
{"title":"Performance comparison of linear multiuser detectors and neural network detector for DS/CDMA systems in AWGN","authors":"Hassan A. Hassan, M. Essai, A. Yahya","doi":"10.1109/ICCES.2015.7393065","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393065","url":null,"abstract":"The most commonly used multiple access technique in wireless communication sphere is the direct sequence code division multiple access. The main drawback of this system is multiple access interference (MAI) caused by sharing a number of users the same channel. Multiuser Detection enhances the performance of DS-CDMA system by combating MAI. In this paper, the performance of the neural network detector is compared with the linear multiuser detectors includes decorrelating (Decor.) detector, and Minimum Mean Squared Error detector (MMSE). This neural network detects the user bits after the bank of matched filter in additive white Gaussian noise channel, with using spreading code of Gold sequence (GS) type. Where these detectors work in both synchronous and asynchronous transmission modes, in this paper its performance was investigated in synchronous AWGN channel. Simulation results show that the performance of linear multiuser detectors depends mainly on the number of active users. The neural network detector is superior to the linear multiuser detectors in the terms of bit error rate (BER) performance.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of building energy monitoring and management system based on wireless sensor networks 基于无线传感器网络的建筑能源监测与管理系统的设计与实现
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393051
M. Abo-Zahhad, Sabah M. Ahmed, M. Farrag, Mohammed F. A. Ahmed, Abdelhay Ali
{"title":"Design and implementation of building energy monitoring and management system based on wireless sensor networks","authors":"M. Abo-Zahhad, Sabah M. Ahmed, M. Farrag, Mohammed F. A. Ahmed, Abdelhay Ali","doi":"10.1109/ICCES.2015.7393051","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393051","url":null,"abstract":"Wireless sensor networks (WSNs) play a key role in extending the smart grid implementation towards residential premises and energy management applications. Efficient supply and demand balance, and consequently reducing the electricity expenses and carbon emissions, is an immediate benefit of implementing smart grids. In this paper, design and implementation of an energy management system (EMS) for efficient load management are proposed. The EMS reduces the consumption of the consumers at the peak load hours and thus reduces the carbon emissions of the household. The proposed system consists of two main parts. The first part is an Energy Management Unit (EMU) which has a graphical user interface for runtime monitoring and control. The second part is sensor nodes which measure the power consumption of the different loads and transfer it to the EMU via multi-hop network. The EMU is implemented using NI LABVIEW software and XBee-PRO ZigBee module to communicate with sensor nodes. Hardware model is implemented using Arduino Uno microcontroller, XBee-PRO ZigBee module and the ACS712 current sensor. The EMS is applied to building of Electrical Engineering Department at Assiut University as a case study.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A hybrid cross-language name matching technique using novel modified Levenshtein Distance 一种基于改进Levenshtein距离的混合跨语言名称匹配技术
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393046
D. Medhat, Ahmed Hassan, Cherif R. Salama
{"title":"A hybrid cross-language name matching technique using novel modified Levenshtein Distance","authors":"D. Medhat, Ahmed Hassan, Cherif R. Salama","doi":"10.1109/ICCES.2015.7393046","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393046","url":null,"abstract":"Name matching is a key component in various applications in our life like record linkage and data mining applications. This process suffers from multiple complexities such as matching data from different languages or data written by people from different cultures. In this paper, we present a new modified Cross-Language Levenshtein Distance (CLLD) algorithm that supports matching names across different writing scripts and with many-to-many characters mapping. In addition, we present a hybrid cross-language name matching technique that uses phonetic matching technique mixed with our proposed CLLD algorithm to improve the overall f-measure and speed up the matching process. Our experiments demonstrate that this method substantially outperforms a number of well-known standard phonetic and approximate string similarity methods in terms of precision, recall, and f-measure.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An agent-based method for automating disturbance handling for FMS 一种基于agent的FMS干扰自动处理方法
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393044
Mahmoud M. Abdelhamied, I. Badr, Mustafa Sami, Adel Drwaish
{"title":"An agent-based method for automating disturbance handling for FMS","authors":"Mahmoud M. Abdelhamied, I. Badr, Mustafa Sami, Adel Drwaish","doi":"10.1109/ICCES.2015.7393044","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393044","url":null,"abstract":"Flexible manufacturing systems (FMS) are characterized by their highly dynamic environment, manifested in the frequent occurrence of disturbances that necessitate the continuous update of the production schedule. In practice, these disturbances are handled manually which results in low productivity and fails to utilize the high potential of automation possessed by the flexible resources on the shop floor of FMS. In this paper, we introduce an agent-based method for automating disturbance handling for FMS. The proposed method is designed to handle the different types of disturbances as machine breakdown and rush orders. A case study of a real FMS in Egypt is described and used to test the feasibility of the proposed method. Test results show a very good potential of the proposed method in automating disturbance handling while optimizing two measures, namely makespan and machine utilization and maintaining good reactivity.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A ZigBee-based industrial WLAN 基于zigbee的工业无线局域网
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393018
Ghada Afifi, Hassan H. Halawa, R. Daoud, H. Amer
{"title":"A ZigBee-based industrial WLAN","authors":"Ghada Afifi, Hassan H. Halawa, R. Daoud, H. Amer","doi":"10.1109/ICCES.2015.7393018","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393018","url":null,"abstract":"This paper evaluates the performance of an industrial Wireless Networked Control System (WNCS). The proposed WNCS utilizes the IEEE 802.15.4 protocol (which ZigBee is based on) without modifications as an alternative that is low cost and low power compared to other wireless technologies. OMNeT++ simulations are used to measure the end-to-end delay and packet loss from the sensors to the controller and from the controller to the actuators. It is demonstrated that the measured delay, including all types of transmission, encapsulation, de-capsulation, queuing and propagation, meet real-time control network requirements while guaranteeing correct packet reception with no packet loss. Moreover, the interference tolerance of the proposed WNCS was quantified. All results presented in this study were based on a 95% confidence analysis.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115855813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new hardware/software partitioning technique 一种新的硬件/软件分区技术
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393030
Hassan A. Youness, A. Hussein, Amal Mahfoz
{"title":"A new hardware/software partitioning technique","authors":"Hassan A. Youness, A. Hussein, Amal Mahfoz","doi":"10.1109/ICCES.2015.7393030","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393030","url":null,"abstract":"Hardware/software (HW/SW) partitioning is one of the most important issues of co-design systems, deciding which components of the system could be implemented in hardware and which ones in software. It plays a crucial role in improving the system performance. HW/SW partitioning problem is also a NP-hard problem. In this paper, a new hardware/software partitioning technique is presented to reduce the overall execution time of the system; the technique is based on dividing the task graphs into levels. In each level, the task with high computing cost and high communication cost is assigned to hardware implementation. If there is no task with the previous specifications, the technique computes granularity of each task, for the task with coarse grain is assigned to hardware implementation. Experimental results conclude that the proposed algorithm is an efficient algorithm to reduce the overall execution time and reduce hardware resources about 45% to the existing one.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hardware attack risk assessment 硬件攻击风险评估
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393073
Samer Moein, F. Gebali, T. Gulliver, M. El-Kharashi
{"title":"Hardware attack risk assessment","authors":"Samer Moein, F. Gebali, T. Gulliver, M. El-Kharashi","doi":"10.1109/ICCES.2015.7393073","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393073","url":null,"abstract":"Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external communications. Attackers target the hardware to imitate or understand the system design, gain access to the system or obtain encryption keys. They may also want to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, risk levels are defined for hardware attacks based on the accessibility, resources, and time required to successfully attack a system.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CGL: A domain specific language for constraint generation CGL:用于约束生成的领域特定语言
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393047
M. A. Elmenyawi, M. Ibrahim, Cherif R. Salama, I. Hafez
{"title":"CGL: A domain specific language for constraint generation","authors":"M. A. Elmenyawi, M. Ibrahim, Cherif R. Salama, I. Hafez","doi":"10.1109/ICCES.2015.7393047","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393047","url":null,"abstract":"Integer linear programming solvers are used to solve a wide variety of problems emerging in diverse domains. However, automatically generating the integer linear equations that are used as input for the solvers remains a challenging task. This paper proposes a domain specific language called CGL that can be used to describe the equations in a concise manner. In addition to the proposed language implementation, the syntax and semantics of CGL are formally given. The paper demonstrates the usefulness of CGL using a motivating example.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of different architectures of counter based Wallace multipliers 基于计数器的华莱士乘法器的不同架构分析
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393034
Shahzad Asif, Yinan Kong
{"title":"Analysis of different architectures of counter based Wallace multipliers","authors":"Shahzad Asif, Yinan Kong","doi":"10.1109/ICCES.2015.7393034","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393034","url":null,"abstract":"Multiplication is one of the most commonly used operations in the signal processing algorithms. Multipliers based on Wallace reduction tree provide an area-efficient strategy for high speed multiplication. A number of modifications are proposed in the literature to optimize the speed and area of the Wallace multiplier. Counter based Wallace multipliers are proved to provide faster operation as compared to the traditional Wallace multipliers. This work proposes a number of architectures for the counter based Wallace multipliers to analyse their performance for various bit lengths. Designs are synthesized using Synopsys Design Compiler in 90 nm process technology and the post synthesis delay and power results are obtained by using Synopsys Prime Time. The proposed counter based Wallace multipliers are also compared with traditional Wallace multiplier to evaluate the energy per operation of both designs. The synthesis results shows that the Power-Delay Product of the counter based Wallace multiplier is up to 17% lower as compared to the traditional Wallace multiplier.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Adaptive Smart Redirect and Jump Algorithm (ASRJ) for Wireless Sensor Networks 无线传感器网络中的自适应智能重定向跳转算法(ASRJ)
2015 Tenth International Conference on Computer Engineering & Systems (ICCES) Pub Date : 2015-12-01 DOI: 10.1109/ICCES.2015.7393054
Esraa Fakhry Farid, Ahmed Akl Mahmoud, Ayman M. Bahaa-Eldin
{"title":"Adaptive Smart Redirect and Jump Algorithm (ASRJ) for Wireless Sensor Networks","authors":"Esraa Fakhry Farid, Ahmed Akl Mahmoud, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES.2015.7393054","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393054","url":null,"abstract":"Wireless Sensor Networks can play an important role in real-time monitoring of buried pipelines and reporting damages more efficient than traditional approaches (i.e. Wired Sensor Networks, and mechanical robots). Wireless pipeline monitoring sensor networks offer accurate, continuous, and real time data monitoring along the pipeline. This can be of a great help in planning preventive maintenance as well as detecting pipeline damage to help in corrective maintenance. Pipelines are characterized by their static linear structure that extends for large distances. This linearity can be of a great help for decreasing routing overhead in communication networks since network topology is static and there is no different routes as in mesh networks. However, most of the existing routing protocols consider mesh networks and little attention is given to routing protocols dedicated for linear structured networks. The Smart Redirect Jump Algorithm is one of the protocols that support this type of networks. In this paper, we present an extended modified version of Smart Redirect Jump Algorithm. Our approach is aiming at reducing energy consumption by controlling packet flow direction due to failing nodes. Simulations were held using OMNeT++ under Linux Environment.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117132965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信