Ahmed E. Sabry, Ahmed Omar, Mohamed Hammad, Nashwa Abdelbaki
{"title":"AVB/TSN Protocols in Automotive Networking","authors":"Ahmed E. Sabry, Ahmed Omar, Mohamed Hammad, Nashwa Abdelbaki","doi":"10.1109/ICCES51560.2020.9334667","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334667","url":null,"abstract":"In the last decade, Ethernet networks that require real time constraints are massively increased. Switched Ethernet is reshaping in-vehicle communications. To meet real-time requirements for diverse data types in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In Vehicle networks requirements are evolving and need better Quality-of-Service (QoS) options. This applies also for industrial networks implementation. Time Sensitive Networking (TSN) IEEE 802.1 Task working group are providing wide variety of Standard. This standard widens the design space for car networks so lots of ideas exists now. We try in this paper to the best of our knowledge, give insights about the studies that were developed for mainly for car networks as well as open issues that are still needs further research.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Diagnosis of Melanoma Through the Analysis of Dermoscopic Images","authors":"Aya Mostafa Mosa Gad, A. Afifi, K. M. Amin","doi":"10.1109/ICCES51560.2020.9334663","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334663","url":null,"abstract":"Malignant melanomas are the most dangerous type of skin cancer. It is fatal and hard to treat it, if is not treated or recognized early. Therefore, early diagnosis of skin cancer is essential to reduce mortality and morbidity of patients. The detection accuracy is also an important factor. In this paper, therefore, we perform and analytical study to investigate the importance of different handcrafted feature categories, imbalance handling methodologies and feature selection algorithms applied to melanoma diagnosis. This analysis allows us to deeply understand the importance of each feature category and to finally design a more accurate melanoma diagnosis approach. In this work, we analyze different hand-crafted based technique to investigate the effect of different features using ABCD (asymmetry, border irregularity, colour, and dermoscopic structure) rule and analyze the effect of different class imbalance handling methodologies to alleviate the effect of class imbalance problem. We applied color consistency preprocessing and scaled down all dataset images then, important features are selected from ABCD extracted features. Finally, these features are classified as benign or malignant, we founded all features group and combination of NCL and bSMOTE class imbalance handling methods produce the best result.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cell Trapping by Dielectrophoresis to Enhance the Identification and Detection of Biological Cell","authors":"Sameh Sherif, Y. Ghallab, M. El-Wakad, Y. Ismail","doi":"10.1109/ICCES51560.2020.9334672","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334672","url":null,"abstract":"Dielectrophoresis (DEP) force has established to be one of the strongest techniques can be used to control in the different biological cell using different techniques for example Cell sorting, Cell Transporting and Cell Trapping. The major target and challenge must be achieved are that how can improve and enhance the sensing and detection stage to enhance the overall detection method. In this study, we establish a new methodology based on the combination between the dielectrophoresis response and the electric impedance detection this combination can achieve the main target of the develop the cell detection techniques. The dielectrophoresis response can be extracted as a significant effect on the cell trapping under different force distribution. The force distribution and the cell response can be combined to enhance the biological cell and different particles identification and detection. The previous and the conventional studies on the cell detection ignore the effect of the cell distribution on the sensing and measuring electrodes during the dielectric parameters detection and measurements such as the ignoring of the cell distribution during the cell impedance detection. The random spread of the cells on the sensing electrodes consider a vital factor during cell dielectric parameters analysis. So, we focus on the using of the effect dielectrophoresis force can overcome this random cell distribution and make the cells being focused on the sensing electrodes.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Machine Learning and Deep Learning in Network Anomaly-Based Intrusion Detection Systems","authors":"M. S. Abdel-Wahab, A. M. Neil, Ayman Atia","doi":"10.1109/ICCES51560.2020.9334553","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334553","url":null,"abstract":"This paper presents a comparative study of Machine learning and Deep learning models used in anomaly-based network intrusion detection systems. The paper has presented an overview of the previous work done in the field of ML and DL IDS, then an overview of the used datasets in reviewed literature was presented. Moreover, ML and DL models were tested on the KDD-99 dataset, and performance results were presented, compared, and discussed. Finally, areas of future research of critical importance are proposed by the authors.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmented Reality Based Learning Environment for Children with Special Needs","authors":"Eman Hassan Shaltout, A. Afifi, K. M. Amin","doi":"10.1109/ICCES51560.2020.9334571","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334571","url":null,"abstract":"Technology interference has become noticeable in all aspects of life. One of the most popular technologies is Augmented Reality (AR) used in all fields to facilitate and enhance those fields. The education filed is one of the areas in which augmented reality has been used extensively during the last years. Augmented reality has contributed to improving traditional educational methods through the integration of digital information with the user’s environment in real-time. Therefore, augmented reality technology can be utilized to teach children with special needs due to its advantages in enriching the learning methodology. This paper introduces the design, development and evaluation of an efficient and low-cost AR-based educational environment for children with special needs. This environment utilizes augmented reality and educational cards to teach children the word from the card, its 3D model and its pronunciation. The proposed educational environment is developed as a mobile-based augmented reality (AR) application to be more attractive for children. The results showed that children enjoy sessions and interact with the application, which improves learning outcomes. Moreover, the user experience questionnaire shows a high level of satisfaction among parents and specialists.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tutorial II: Network Security","authors":"Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES51560.2020.9334652","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334652","url":null,"abstract":"The field of computer and network security is an aggressive challenging and growing filed in its academic, research and industrial aspects. Attacks and breaches are increasing rapidly as the attack surface of the Internet has exploded with the IoT technologies and connected devices. Enormous data feeds on ultra-high-speed backbone and access networks has to be analyzed to detect very dangerous and intelligent attacks. In this talk, we emphasize on the problem size of securing digital resources. The challenges of modern security practices are detailed. Finally, the recent trends in Artificial Intelligence based systems for networks security are presented. Intelligent traffic analysis is detailed and machine learning role in security is presented. New trends and directions of research are overviewed.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ensemble Classification Technique of Neurodegenerative Diseases from Gait Analysis","authors":"Mariam Heikal, S. Eldawlatly","doi":"10.1109/ICCES51560.2020.9334609","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334609","url":null,"abstract":"Neurodegenerative diseases (NDDs) lead to extreme locomotion disorders, which stem from the impairment of motor function caused by these diseases. They alter the gait rhythms and gait dynamics of their patients, which can be reflected in their time-series recordings of footfall contact times. Studies has shown that human gait can be used to identify NDDs. In this paper, an ensemble classification-based diagnostic system that uses patients’ gait data to diagnose NDDs is introduced. The diagnostic system is an ensemble of four binary classifications. The proposed technique is applied to gait dynamics data recorded from 64 subjects representing three NDDs: Amyotrophic Lateral Sclerosis (ALS), Parkinson’s Disease (PD), and Huntington’s Disease (HD), in addition to healthy subjects. Our results demonstrate the ability of the proposed technique to recognize gait dynamics of ALS, PD and HD with an accuracy of 96.8, 86.8% and 85.5%, respectively. These results demonstrate the efficacy of the proposed approach in diagnosing NDDs from gait analysis.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Mimikatz in Lateral Movements Using Mutex","authors":"M. G. El-Hadidi, Marianne A. Azer","doi":"10.1109/ICCES51560.2020.9334643","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334643","url":null,"abstract":"Advanced Persistent Threat (APT) is a stealthy computer network attack. Its threat lies in the fact that unauthorized access to a network is gained and the attackers, whether a person or a group may remain undetected for an extended period. APT group can spread and gain access to the most valuable assets in the targeted organization. Depending on the tools used by APT group it can be hard and complex to respond to those groups and their tools. Mimikatz is one of the most powerful tools used by many APT groups, penetration testers and malware. In this paper, we focus on lateral movement and APT detection of Mimikatz. The main objective is an increased accuracy level while reducing the detection time for any Mimikatz version within networks using a Mutex object.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Algorithm for Preventing Intentional Fork in the Bitcoin Environment","authors":"Ahmed H. Madkour, Asmaa H. Elsaid, H. Abdelkader","doi":"10.1109/ICCES51560.2020.9334563","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334563","url":null,"abstract":"Most Bitcoin systems use blockchain technology to store all historical transaction data. Blockchain is a linked list structure but may be changed to a fork structure; a useful fork or an intentional fork. The useful fork may occur when the rules of the block are updated. On the other side, the intentional fork occurs when a miner has supercomputer properties that generate a set of blocks as a branch and does not publish this branch to the blockchain until the length of that branch is greater than the length of the main branch. When this fork occurs in the system, a set of blockchain transactions will be rollbacked, user waiting times increases, and miner rewards increases illegally. In this paper, the Lightweight algorithm is proposed to avoid the intentional fork issue and therefore rollback issue, users waiting time is reduced in the transaction process. The proposed algorithm is to make a single publisher in the system and divides the block construction into two phases. In the first phase, a miner generates a block and sends it to the memory pool. In the second phase, the memory pool will publish the block to the blockchain. The results show that the proposed algorithm has a good ability to avoid the intentional fork issue in the blockchain and the rollback issue thus minimize user waiting times.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Remotely Automated Control to the 14-inch Telescope System","authors":"A. Mansour, F. Elnagahy, M. Ismail","doi":"10.1109/ICCES51560.2020.9334664","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334664","url":null,"abstract":"We have implemented a real-time remotely astronomical observation in Egypt. Now that a remote observer would be able to access our 14-inch astronomical telescope (CGE 1400), a dome enclosure, a CCD detector, and various scientific instruments. It is based on a developed integrated system, with a graphical user interface, making use of a TCP/IP protocol. Our platform is more affordable, robust, and applicable for other observatories, even for not computerized systems. Further, neither commercial kits nor software are used. The utilized communication protocol is basically based on row packets to achieve convenient speed in data transfer. We provide a comparison with current commercial systems and previous research in this trend.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}