{"title":"Performance comparison of linear multiuser detectors and neural network detector for DS/CDMA systems in AWGN","authors":"Hassan A. Hassan, M. Essai, A. Yahya","doi":"10.1109/ICCES.2015.7393065","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393065","url":null,"abstract":"The most commonly used multiple access technique in wireless communication sphere is the direct sequence code division multiple access. The main drawback of this system is multiple access interference (MAI) caused by sharing a number of users the same channel. Multiuser Detection enhances the performance of DS-CDMA system by combating MAI. In this paper, the performance of the neural network detector is compared with the linear multiuser detectors includes decorrelating (Decor.) detector, and Minimum Mean Squared Error detector (MMSE). This neural network detects the user bits after the bank of matched filter in additive white Gaussian noise channel, with using spreading code of Gold sequence (GS) type. Where these detectors work in both synchronous and asynchronous transmission modes, in this paper its performance was investigated in synchronous AWGN channel. Simulation results show that the performance of linear multiuser detectors depends mainly on the number of active users. The neural network detector is superior to the linear multiuser detectors in the terms of bit error rate (BER) performance.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Abo-Zahhad, Sabah M. Ahmed, M. Farrag, Mohammed F. A. Ahmed, Abdelhay Ali
{"title":"Design and implementation of building energy monitoring and management system based on wireless sensor networks","authors":"M. Abo-Zahhad, Sabah M. Ahmed, M. Farrag, Mohammed F. A. Ahmed, Abdelhay Ali","doi":"10.1109/ICCES.2015.7393051","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393051","url":null,"abstract":"Wireless sensor networks (WSNs) play a key role in extending the smart grid implementation towards residential premises and energy management applications. Efficient supply and demand balance, and consequently reducing the electricity expenses and carbon emissions, is an immediate benefit of implementing smart grids. In this paper, design and implementation of an energy management system (EMS) for efficient load management are proposed. The EMS reduces the consumption of the consumers at the peak load hours and thus reduces the carbon emissions of the household. The proposed system consists of two main parts. The first part is an Energy Management Unit (EMU) which has a graphical user interface for runtime monitoring and control. The second part is sensor nodes which measure the power consumption of the different loads and transfer it to the EMU via multi-hop network. The EMU is implemented using NI LABVIEW software and XBee-PRO ZigBee module to communicate with sensor nodes. Hardware model is implemented using Arduino Uno microcontroller, XBee-PRO ZigBee module and the ACS712 current sensor. The EMS is applied to building of Electrical Engineering Department at Assiut University as a case study.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid cross-language name matching technique using novel modified Levenshtein Distance","authors":"D. Medhat, Ahmed Hassan, Cherif R. Salama","doi":"10.1109/ICCES.2015.7393046","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393046","url":null,"abstract":"Name matching is a key component in various applications in our life like record linkage and data mining applications. This process suffers from multiple complexities such as matching data from different languages or data written by people from different cultures. In this paper, we present a new modified Cross-Language Levenshtein Distance (CLLD) algorithm that supports matching names across different writing scripts and with many-to-many characters mapping. In addition, we present a hybrid cross-language name matching technique that uses phonetic matching technique mixed with our proposed CLLD algorithm to improve the overall f-measure and speed up the matching process. Our experiments demonstrate that this method substantially outperforms a number of well-known standard phonetic and approximate string similarity methods in terms of precision, recall, and f-measure.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmoud M. Abdelhamied, I. Badr, Mustafa Sami, Adel Drwaish
{"title":"An agent-based method for automating disturbance handling for FMS","authors":"Mahmoud M. Abdelhamied, I. Badr, Mustafa Sami, Adel Drwaish","doi":"10.1109/ICCES.2015.7393044","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393044","url":null,"abstract":"Flexible manufacturing systems (FMS) are characterized by their highly dynamic environment, manifested in the frequent occurrence of disturbances that necessitate the continuous update of the production schedule. In practice, these disturbances are handled manually which results in low productivity and fails to utilize the high potential of automation possessed by the flexible resources on the shop floor of FMS. In this paper, we introduce an agent-based method for automating disturbance handling for FMS. The proposed method is designed to handle the different types of disturbances as machine breakdown and rush orders. A case study of a real FMS in Egypt is described and used to test the feasibility of the proposed method. Test results show a very good potential of the proposed method in automating disturbance handling while optimizing two measures, namely makespan and machine utilization and maintaining good reactivity.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A ZigBee-based industrial WLAN","authors":"Ghada Afifi, Hassan H. Halawa, R. Daoud, H. Amer","doi":"10.1109/ICCES.2015.7393018","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393018","url":null,"abstract":"This paper evaluates the performance of an industrial Wireless Networked Control System (WNCS). The proposed WNCS utilizes the IEEE 802.15.4 protocol (which ZigBee is based on) without modifications as an alternative that is low cost and low power compared to other wireless technologies. OMNeT++ simulations are used to measure the end-to-end delay and packet loss from the sensors to the controller and from the controller to the actuators. It is demonstrated that the measured delay, including all types of transmission, encapsulation, de-capsulation, queuing and propagation, meet real-time control network requirements while guaranteeing correct packet reception with no packet loss. Moreover, the interference tolerance of the proposed WNCS was quantified. All results presented in this study were based on a 95% confidence analysis.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115855813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hardware/software partitioning technique","authors":"Hassan A. Youness, A. Hussein, Amal Mahfoz","doi":"10.1109/ICCES.2015.7393030","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393030","url":null,"abstract":"Hardware/software (HW/SW) partitioning is one of the most important issues of co-design systems, deciding which components of the system could be implemented in hardware and which ones in software. It plays a crucial role in improving the system performance. HW/SW partitioning problem is also a NP-hard problem. In this paper, a new hardware/software partitioning technique is presented to reduce the overall execution time of the system; the technique is based on dividing the task graphs into levels. In each level, the task with high computing cost and high communication cost is assigned to hardware implementation. If there is no task with the previous specifications, the technique computes granularity of each task, for the task with coarse grain is assigned to hardware implementation. Experimental results conclude that the proposed algorithm is an efficient algorithm to reduce the overall execution time and reduce hardware resources about 45% to the existing one.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samer Moein, F. Gebali, T. Gulliver, M. El-Kharashi
{"title":"Hardware attack risk assessment","authors":"Samer Moein, F. Gebali, T. Gulliver, M. El-Kharashi","doi":"10.1109/ICCES.2015.7393073","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393073","url":null,"abstract":"Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external communications. Attackers target the hardware to imitate or understand the system design, gain access to the system or obtain encryption keys. They may also want to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, risk levels are defined for hardware attacks based on the accessibility, resources, and time required to successfully attack a system.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Elmenyawi, M. Ibrahim, Cherif R. Salama, I. Hafez
{"title":"CGL: A domain specific language for constraint generation","authors":"M. A. Elmenyawi, M. Ibrahim, Cherif R. Salama, I. Hafez","doi":"10.1109/ICCES.2015.7393047","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393047","url":null,"abstract":"Integer linear programming solvers are used to solve a wide variety of problems emerging in diverse domains. However, automatically generating the integer linear equations that are used as input for the solvers remains a challenging task. This paper proposes a domain specific language called CGL that can be used to describe the equations in a concise manner. In addition to the proposed language implementation, the syntax and semantics of CGL are formally given. The paper demonstrates the usefulness of CGL using a motivating example.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of different architectures of counter based Wallace multipliers","authors":"Shahzad Asif, Yinan Kong","doi":"10.1109/ICCES.2015.7393034","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393034","url":null,"abstract":"Multiplication is one of the most commonly used operations in the signal processing algorithms. Multipliers based on Wallace reduction tree provide an area-efficient strategy for high speed multiplication. A number of modifications are proposed in the literature to optimize the speed and area of the Wallace multiplier. Counter based Wallace multipliers are proved to provide faster operation as compared to the traditional Wallace multipliers. This work proposes a number of architectures for the counter based Wallace multipliers to analyse their performance for various bit lengths. Designs are synthesized using Synopsys Design Compiler in 90 nm process technology and the post synthesis delay and power results are obtained by using Synopsys Prime Time. The proposed counter based Wallace multipliers are also compared with traditional Wallace multiplier to evaluate the energy per operation of both designs. The synthesis results shows that the Power-Delay Product of the counter based Wallace multiplier is up to 17% lower as compared to the traditional Wallace multiplier.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Esraa Fakhry Farid, Ahmed Akl Mahmoud, Ayman M. Bahaa-Eldin
{"title":"Adaptive Smart Redirect and Jump Algorithm (ASRJ) for Wireless Sensor Networks","authors":"Esraa Fakhry Farid, Ahmed Akl Mahmoud, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES.2015.7393054","DOIUrl":"https://doi.org/10.1109/ICCES.2015.7393054","url":null,"abstract":"Wireless Sensor Networks can play an important role in real-time monitoring of buried pipelines and reporting damages more efficient than traditional approaches (i.e. Wired Sensor Networks, and mechanical robots). Wireless pipeline monitoring sensor networks offer accurate, continuous, and real time data monitoring along the pipeline. This can be of a great help in planning preventive maintenance as well as detecting pipeline damage to help in corrective maintenance. Pipelines are characterized by their static linear structure that extends for large distances. This linearity can be of a great help for decreasing routing overhead in communication networks since network topology is static and there is no different routes as in mesh networks. However, most of the existing routing protocols consider mesh networks and little attention is given to routing protocols dedicated for linear structured networks. The Smart Redirect Jump Algorithm is one of the protocols that support this type of networks. In this paper, we present an extended modified version of Smart Redirect Jump Algorithm. Our approach is aiming at reducing energy consumption by controlling packet flow direction due to failing nodes. Simulations were held using OMNeT++ under Linux Environment.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117132965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}