Mohamed E. Gad, T. Ismail, Sameh Hosny, B. Mokhtar
{"title":"Comparative Study of Vehicular Proactive Caching Between Cellular and VLC Networks","authors":"Mohamed E. Gad, T. Ismail, Sameh Hosny, B. Mokhtar","doi":"10.1109/ICCES51560.2020.9334556","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334556","url":null,"abstract":"The rapid growth of vehicle demand, such as information sharing, entertainment, and multimedia contents, overwhelms the back-haul network. Due to this nature of the network that suffers from high link disconnections and limited resources, it is challenging to develop a new strategy to satisfy users’ requirements. Proactive caching is a useful technique to mitigate the load on core networks, and determining the best caching placement of data time to enhance the network is a significant issue. However, radiofrequency is spreading and supporting multiple channels communication, and has a licensed bandwidth and low data rates. In this paper, a novel proactive caching scheme based on an optical communication system is proposed. We exploit the high data rate of visible light communication VLC in the vehicular networks to minimize total network cost. The optimal caching placement is determined by solving the optimization problem through a genetic algorithm according to vehicle demand profiles. Also, we present suitable analysis for caching effects in average blocking and data throughput. Compared with radio techniques, numerical results illustrate that the proposed solution has a significant caching gain, average user blocking, and network throughput at different conditions.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126171313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seif Shawkat, G. Alkady, H. Amer, R. Daoud, I. Adly
{"title":"Extensible Fault Secure Sift-Out Technique for FPGA-based Applications","authors":"Seif Shawkat, G. Alkady, H. Amer, R. Daoud, I. Adly","doi":"10.1109/ICCES51560.2020.9334653","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334653","url":null,"abstract":"This paper describes a fault secure Restoring Organ (RO) for a fault-tolerant Sift-Out architecture with n identical modules. All n modules as well as the RO are implemented on a SRAM-based FPGA. Whether a module is affected by a temporary (Single Event Upset) or a permanent fault, it is proven that the RO can detect and recover from this fault. Furthermore, the RO is fault secure; when it is itself affected by a temporary or a permanent fault, its output indicates that it is erroneous to prevent the propagation of incorrect data. Finally, the RO is extensible; it is shown how it can accommodate n modules for n≥4. The design is successfully synthesized and implemented on a Xilinx XC7VX485TFFG1157-1 device.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Modsecurity Web Application Firewall Against SQL Injection Attacks","authors":"Basem Ibrahim Mukhtar, Marianne A. Azer","doi":"10.1109/ICCES51560.2020.9334626","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334626","url":null,"abstract":"SQL injection attacks target databases of web servers. The ability to modify, update, retrieve and delete database contents imposes a high risk on any website in different sectors. In this paper, we investigate the efforts done in the literature to detect and prevent the SQL injection attacks. We also assess the efficiency of the Modsecurity web application firewall in preventing SQL injection attacks.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICCES 2020 Reviewer Statistics","authors":"","doi":"10.1109/icces51560.2020.9334590","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334590","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized Fractured Integer Multiplier Based on Divide and Conquer with Tree Pruning","authors":"Rizk Tawfik, Cherif R. Salama, M. El-Kharashi","doi":"10.1109/ICCES51560.2020.9334645","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334645","url":null,"abstract":"Data parallel applications frequently work with data elements whose width is less than the processor dathpath width. However, most processors do not support parallelism of multiple sub-width elements but rather expand them to the datapath width and process them in a sequential manner. In this paper, we propose a set of systematic divide and conquer approaches to design a fractured integer multiplier unit which allows for either a single datapath-width multiplication or multiple sub-width multiplications to be simultaneously executed. The supported integer width can be configured at runtime. We also evaluate and compare the proposed approaches demonstrating the advantages and disadvantages of each. Such fractured multipliers are particularly suitable for vector and multimedia processors.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"689 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of Visual Question Answering Algorithms","authors":"A. Mostafa, Hazem M. Abbas, M. Khalil","doi":"10.1109/ICCES51560.2020.9334686","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334686","url":null,"abstract":"Visual Question Answering (VQA) is a recent task that challenges algorithms to reason about the visual content of an image to be able to answer a natural language question. In this study, we compare the performance of state of the art VQA algorithms on different VQA benchmarks. Each benchmark is more effective at testing VQA algorithms on different levels. Some datasets challenge the algorithms to perform complex reasoning steps to arrive to an answer. Other datasets might challenge algorithms to retrieve external world knowledge to answer the posed questions. We categorize the algorithms by their main contributions into 4 categories. Firstly, the joint embedding approach which focuses on how to map the visual and textual data into a common embedding space. Secondly, attention based methods which focuses on relevant parts of the image or the question. Thirdly, compositional models which deal with composing a model from smaller modules. Finally, we introduce external-knowledge based algorithms which need external sources to be able to retrieve facts necessary to answer a question when those facts may not be present in the scene nor in the whole training data set. We also mention other algorithms that don’t specifically belong to the aforementioned categories, but offers performance competitive with the state of the art.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Control of Geothermal Power Plant by Using PI Controller Based on Genetic Algorithm","authors":"N. Azazy, W. Helmy, H. Hasanien","doi":"10.1109/ICCES51560.2020.9334604","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334604","url":null,"abstract":"A Controlled Geothermal power plant model for low temperature geothermal plant is presented in this paper using the Simulink model, and MATLAB software which represents the whole power plant showing the electrical power, and it’s variation with the different geothermal temperatures. The model includes all the mechanical equations, and energy conversion equations related to the organic Rankine cycle, and the organic fluid used in the mechanical part of the plant, and their effect on the generated electrical power. The model shows clearly the variation, and unstable response of the electrical power output energy signals at different geothermal temperatures in Egypt’s promising geothermal regions. A PI controller based on the Genetic Algorithm is used to control the turbine to overcome the variation of the output power at so as to be able to be integrated into a distribution power system. The results of this research help strongly the governmental, and private sectors working on geothermal energy in Egypt to specify the best locations of the geothermal power plants to be integrated into the network, and predict easily the quantity of the electric power energy can be generated.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fall Detection Based on RetinaNet and MobileNet Convolutional Neural Networks","authors":"Hadir Abdo, K. M. Amin, Ahmad M. Hamad","doi":"10.1109/ICCES51560.2020.9334570","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334570","url":null,"abstract":"The problem of falling is a major health problem resulting in serious injuries and sometimes lead to death especially for elderly. Elderly people aged over than 75 are exposed to accidental deaths due to falls. Approaches based on computer vision give a promising and an effective solution for detection human falls. This paper presented a method for fall detection which based on combining convolutional neural networks RetinaNet and Mobilenet in addition to handcrafted features. Traditional human detection methods may result in human shape deformation which affect the performance of fall detection frameworks. Therefore, the proposed framework depends on RetinaNet for detecting humans with shorter computing time and higher accuracy compared with the traditional human detection methods. Then, the proposed framework relies on handcrafted features to represent shape and motion properties of the detected human. The proposed framework extracts aspect ratio and head position as shape features and motion history image as a motion feature of the detected human to create the feature map. This feature map is used in training MobileNet network to classify the human motion into fall or not-fall. The proposed framework is evaluated using UR and FDD datasets and the experimental results proved the efficiency of the proposed framework achieving up to 98% accuracy compared with the state-of-the-art methods.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"157 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128179812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session AI: Artificial Intelligence","authors":"","doi":"10.1109/icces51560.2020.9334674","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334674","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based AI and its Implementations in Industries","authors":"Sherif El-Gendy","doi":"10.1109/ICCES51560.2020.9334627","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334627","url":null,"abstract":"The Internet of Things (IoT) is an Internet revolution that is increasingly used in business, industry, medicine, the economy and other modern information society. IoT, particularly transport, industrial robots and automation systems are supported by artificial intelligence in a wide range of daily implementations with dominant industrial applications. IoT is an interconnected network of physical objects, which enables them to gather and share information, using software, sensor units and network connectivity. In industries; IoT brought about a new revolution in industries. In the field of IoT, the term “INDUSTRY 4.0” has been used where industrial devices and machines are connected over the internet and interacting to make decisions via Artificial Intelligence (M2M communication). This paper focuses on IoT and AI integration worldwide, addressing current and future uses for social-value.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131328432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}