Yasmin K. Abdelmagid, Renad T. Nawar, Mennatullah K. Rabie, Ahmed S. Tulan, Ahmed H. Hassan, Andoleet Saleh, H. Mostafa
{"title":"Investigation of DW Spintronic Memristor performance in 2T1M Neuromorphic Synapse","authors":"Yasmin K. Abdelmagid, Renad T. Nawar, Mennatullah K. Rabie, Ahmed S. Tulan, Ahmed H. Hassan, Andoleet Saleh, H. Mostafa","doi":"10.1109/NILES50944.2020.9257896","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257896","url":null,"abstract":"Memristor, the two-terminal memory-resistance device discovered by Chua in 1971, is a promising solution for future processing problems. Its CMOS integration compatibility and large resistance in small size, makes it very successful candidate for large-scale systems like Neural Networks. In last decade, memristors were used in many Neuromorphic Synapses for its advantage of combining processing (dot-product) and memory in same device. There are different materials that can be used to fabricate memristors. In this paper, a comparison between spintronic and TiO2-resistive memristor in two-transistors-one memristor synapse, is introduced. The work was done on Cadence Virtuoso with using Verilog-A for memristor modeling. The comparison reveals that the synaptic implementation with a spintronic memristor is more efficient when high speed is needed. However, the resistive memristor is more adequate due to its lower power dissipation.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Platform Modifications Towards an Autonomous Multi-Passenger Golf Cart","authors":"Hady Hafez, S. Maged, A. Osama, M. Abdelaziz","doi":"10.1109/NILES50944.2020.9257898","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257898","url":null,"abstract":"This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Randa Bakr, A. El-Banna, Sami A. A. El-Shaikh, A. S. Eldien
{"title":"Energy Efficient Spectrum Aware Distributed Cluster-Based Routing in Cognitive Radio Sensor Networks","authors":"Randa Bakr, A. El-Banna, Sami A. A. El-Shaikh, A. S. Eldien","doi":"10.1109/NILES50944.2020.9257972","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257972","url":null,"abstract":"Cognitive Radio Sensor Networks (CRSNs) have become an integral portion of the new generation of smart Wireless Sensor Networks (WSNs) technology. Moreover, efficient clustering and routing could enhance the network performance by taking into account the stability and connectivity of the network that expands the network's lifetime. In this paper, we propose a scheme that aims to construct an energy-efficient clustering for CRSNs through saving the intra-communication energy between nodes into the cluster, in addition to the inter-communication energy between Cluster Head (CH) nodes to the Base Station (BS). The scheme utilizes evaluation criteria to define the CH node for each cluster by calculating a weight value for each node, and depending on the maximum weight value for nodes, the CH is picked. Moreover, to establish a route between CHs, we consider common channels between them plus the shortest distance from cluster heads to the sink. In this way, clustering and routing could enhance the network performance and extend the lifetime. To corroborate the proposed scheme, extensive simulations in MATLAB were carried out and the results of the simulation showed the superiority of the proposed technique over other algorithms in terms of the network’s lifetime.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123583117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ibrahim, Rania M. Hassan, Andrew E. Tawfiles, T. Ismail, M. Darweesh
{"title":"Real-Time Collision Warning System Based on Computer Vision Using Mono Camera","authors":"A. Ibrahim, Rania M. Hassan, Andrew E. Tawfiles, T. Ismail, M. Darweesh","doi":"10.1109/NILES50944.2020.9257941","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257941","url":null,"abstract":"This paper aims to help self-driving cars and autonomous vehicles systems to merge with the road environment safely and ensure the reliability of these systems in real life. Crash avoidance is a complex system that depends on many parameters. The forward-collision warning system is simplified into four main objectives: detecting cars, depth estimation, assigning cars into lanes (lane assign) and tracking technique. The presented work targets the software approach by using YOLO (You Only Look Once), which is a deep learning object detector network to detect cars with an accuracy of up to 93%. Therefore, apply a depth estimation algorithm that uses the output boundary box’s dimensions (width and height) from YOLO. These dimensions used to estimate the distance with an accuracy of 80.4%. In addition, a real-time computer vision algorithm is applied to assign cars into lanes. However, a tracking proposed algorithm is applied to evaluate the speed limit to keep the vehicle safe. Finally, the real-time system achieved for all algorithms with streaming speed 23 FPS (frame per second).","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game Theory for Computation Offloading and Resource Allocation in Edge Computing: A Survey","authors":"Marwa Zamzam, T. el-Shabrawy, M. Ashour","doi":"10.1109/NILES50944.2020.9257921","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257921","url":null,"abstract":"Edge computing is considered a promising approach to provide cloud computing capabilities at the edge of the network near to the users. However, the limited number of computation and communication resources at the edge have made the problem of offloading and resource allocation a challenging issue for service providers. Game theory analyzes the behavior of the users and succeeds to obtain solutions in this area where all users are satisfied and the problem reaches an equilibrium state. In this paper, first we give a brief background on game theory showing its definition, types and advantages. Second, we give an overview about edge computing system showing its architecture, challenges and kinds of resource management. Third, we provide a survey about significant achievements of applying game theory in edge computing problems. We categorize the state-of-the-art according to the objective function of the problem. It is divided into seven classes: 1) minimizing the latency, 2) minimizing the energy, 3) minimizing the cost, 4) minimizing both latency and energy, 5) minimizing energy and cost, 6) minimizing latency and cost and finally, 7) minimizing all together latency, cost and energy. Moreover, we present the lessons learned and the future research directions.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129347860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayman Gaber, Mohamed Adel ElBahaay, A. M. Mohamed, M. Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki
{"title":"5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies","authors":"Ayman Gaber, Mohamed Adel ElBahaay, A. M. Mohamed, M. Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257914","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257914","url":null,"abstract":"Development of 5G system as a global telecommunication infrastructure is accelerating to realize the concept of a unified network infrastructure incorporating all access technologies. The potential of Low Earth Orbit (LEO) constellation systems has emerged to support wide range of services. This could help to achieve 5G key service requirements for enhanced Mobile Broadband (eMBB), Massive Machine-Type Communications (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). The integration of satellite communications with the 5G New Radio (NR) is stimulated by technology advancement to support challenging service requirements and demand for ubiquitous connectivity with the best possible quality of service. In this paper, we surveyed the opportunities of integrating terrestrial mobile and satellite networks, key technical challenges and proposed solutions. We also introduced a mobility management scheme that reduces signaling overhead and minimizes service interruption during inter satellite handover process.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation","authors":"Mariam El-Sobky, Hisham Sarhan, Mervat Abu-Elkheir","doi":"10.1109/NILES50944.2020.9257955","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257955","url":null,"abstract":"Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan
{"title":"Adoption of Hybrid StateChart Principle in a Hierarchical Formation Architecture for Configurable Vehicles","authors":"M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan","doi":"10.1109/NILES50944.2020.9257953","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257953","url":null,"abstract":"Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"31 4-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks","authors":"Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257912","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257912","url":null,"abstract":"Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abduel Rahman Magdy, Muhammad Mahmoud Kamal, A. Guaily
{"title":"Design of a Schlieren System for Visualization of Heat and Mass Transfer","authors":"Abduel Rahman Magdy, Muhammad Mahmoud Kamal, A. Guaily","doi":"10.1109/NILES50944.2020.9257970","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257970","url":null,"abstract":"In this contribution, a simple yet effective design for Schlieren photography system is described and implemented. The proposed system is used in the visualization of both heat and mass transfer phenomena. Refractive index gradient is created by a lighter to study mass transfer, then the lighter is ignited to create temperature gradient. Results show the ability of the proposed system in capturing the gradients in both mass and temperature gradients.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}