2020 International Conference on Computer Science and Software Engineering (CSASE)最新文献

筛选
英文 中文
Hybrid Chaotic Scheme for Secure OFDM-PON Transmission OFDM-PON安全传输的混合混沌方案
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142120
Huda Ismail Olewi, R. Fyath
{"title":"Hybrid Chaotic Scheme for Secure OFDM-PON Transmission","authors":"Huda Ismail Olewi, R. Fyath","doi":"10.1109/CSASE48920.2020.9142120","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142120","url":null,"abstract":"Different chaotic security schemes have been applied in the literature to secure transmission over orthogonal frequencies-division multiplexing (OFDM)-passive optical networks (PONs). All these schemes have been based on threedimensional (3D) or four-dimensional (4D) chaos systems and have been applied to direct-detection (DD) OFDM-PONs. This paper proposes the use of 7D hybrid chaotic scheme to provide physical-layer security in both DD and coherent OFDM-PONs. The hybrid scheme uses a combination of 3D chaotic mapping scheme and 4D chaotic discrete Hartley transform precoding. The proposed chaotic security scheme is applied successfully for both DD-and coherent OFDM-PONs, and the results show that the security is very sensitive to initial conditions of both subchaotic systems.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSASE 2020 Keynote Speaker-3 CSASE 2020主题演讲-3
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/csase48920.2020.9142047
{"title":"CSASE 2020 Keynote Speaker-3","authors":"","doi":"10.1109/csase48920.2020.9142047","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142047","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-Based Model for Dissemination of Advertising 基于网络的广告传播模型
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142074
Thaer Alramli, Basim Mahmood, D. Kadhim
{"title":"Network-Based Model for Dissemination of Advertising","authors":"Thaer Alramli, Basim Mahmood, D. Kadhim","doi":"10.1109/CSASE48920.2020.9142074","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142074","url":null,"abstract":"The rapid development of mobile devices and their vast range of affordances have been widely exploited for commercial purposes these days. Moreover, mobile advertising is considered as a new trend of commercials for advertisers and marketers. It provides an opportunity to access consumers remotely at any time and any place. Recently, mobile advertising has been grown faster than most of other digital advertising formats. The current infrastructure of mobile devices provides with a convenient platform for mobile advertising. Therefore, the most effective way for mobile advertising is the use of mobile applications. Yet, advertising companies try to adopt new methods for improving their advertising campaign. In this paper, we investigate two dissemination-related issues in mobile advertising, namely, dissemination distance (for an ad), and dissemination direction. We propose two social inspired methods for the purpose of controlling the dissemination of ads within an area of interest. The first method is based on the concept of weak ties (in social networks) among individuals for disseminating ads and the second method is based on the concept of degree centrality of individuals. The findings show that our proposed approaches are efficient and reflected a high performance in terms of dissemination distance, and dissemination direction.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127666090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Evaluation Methods and the used parameters for Some Cryptosystem 某些密码系统的安全性评估方法及使用的参数
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142076
S. Sadkhan, S. F. Jawad
{"title":"Security Evaluation Methods and the used parameters for Some Cryptosystem","authors":"S. Sadkhan, S. F. Jawad","doi":"10.1109/CSASE48920.2020.9142076","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142076","url":null,"abstract":"the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"AES-7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126506446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Response Time Study of Cloud Web Application - Based Smart Monitoring System 基于云Web应用的智能监控系统响应时间研究
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142099
S. Al-Shammari, A. Husein
{"title":"Response Time Study of Cloud Web Application - Based Smart Monitoring System","authors":"S. Al-Shammari, A. Husein","doi":"10.1109/CSASE48920.2020.9142099","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142099","url":null,"abstract":"The Internet of Things (IoT) has a vital role in managing organisations in daily life. In addition, it is significant in the real-time monitoring systems. This has led to the importance of finding ways to minimise the time required to process the data. Wireless Sensor Networks (WSNs) are used in IoT to collect the data from the monitored environments to the servers. Managing real-time applications requires the management of the transmitted data between the client-side and the provider side. Managing the monitored data in IoT requires processing the transmitted data into the cloud. Web services technologies are used in managing and implementing cloud applications APIs (Application Programming Interfaces). This paper presents an implementation of a cloud web application for a smart monitoring system using Representational State Transfer (REST) architecture; the paper also introduces a performance evaluation for the transmitted data, which includes the response time required in the transmission process. This research discusses the effect of multitenancy on the overall system performance.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Enhancement of Speech Scrambling Techniques Based on Many Chaotic Signals 基于多混沌信号的语音置乱技术性能增强
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142062
Ammar M. Raheema, Sattar B. Sadkhan-SMIEEE, Sinan M. Abdul Satar
{"title":"Performance Enhancement of Speech Scrambling Techniques Based on Many Chaotic Signals","authors":"Ammar M. Raheema, Sattar B. Sadkhan-SMIEEE, Sinan M. Abdul Satar","doi":"10.1109/CSASE48920.2020.9142062","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142062","url":null,"abstract":"scrambling method structure consists of three main components: scrambling, noisy channel and descrambling. The scrambling and descrambling processes. On the basis of chaotic signals, a speech scrambling technique is an essential work to upgrade and improve data protection in secure communication applications, especially military applications, and the main idea is immunity against eavesdropper to achieve security. The aim of uses the key encrypted in the Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing QAM OFDM system to improve performance of the Bits Error Rates BER on the receiving side that is robust against the effects of the Additive White Gaussian Noise AWGN. This paper has been published a speech authentication model using five separate chaotic maps / flows: Logistic maps LM, Baker maps BM, Henon map HM, Rössler system RÖS and Lorenz system LS based on 16-64 QAM_OFDM technique. The evaluation measures included six different tests: Segmental spectral signal to ratio of noise SSSNR, Log spectral distance dLOG, Linear predict coding distance dLPC, cepstral distance dCD, Frequency Weighted log Spectral distance dFWLOG and Bit error rate BER. Objective tests to measure the residual intelligibility R.I. of speech between the original and scrambling/ descrambling signal for proposed models: dLOG= 14.5415, dLPC= 0.9741, dCD= 8.8503, SSSNR= −26.506, and dFWLOG= 20.9976, While the BER between the original signal and recovered signal at 10 dB about 10-03, Which is big enough to protect the brute force attack encryption signal. We conducted a series of unpredictable map / flow randomness tests: Lyapunov exponent test and Auto correlation.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Three-stage Junction Detection in Document Images 文档图像中的三阶段连接检测
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142083
Hasan S. M. Al-Khaffaf, A. Talib
{"title":"Three-stage Junction Detection in Document Images","authors":"Hasan S. M. Al-Khaffaf, A. Talib","doi":"10.1109/CSASE48920.2020.9142083","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142083","url":null,"abstract":"Engineering drawings contain many curves that intersect at a complex junction. Detection of these junctions is vital for correct recognition of line drawings. In this paper we study the detection of junctions in document images. A threestage junction detection is proposed to detect junctions in document images. The first stage works at the pixel level. Any pixel with more than two neighbors is labeled as low-level-junction. The second stage works at connected component level. All low-level-junctions adjacent to other low-level-junctions are merged into mid-level-junctions. The third stage combines mid-level-junction at a distance less than a threshold into a high-level-junction. Experimental results on real scanned images of mechanical engineering drawings show a precision rate of 82.38% and a recall rate of 97.29%.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Model of Faculty Experience in E-Learning Student Satisfaction E-Learning中教师体验的学生满意度模型
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142071
R. M. Tawafak, Ghaliya Alfarsi, M. Alnuaimi, Abdalla Eldow, S. I. Malik, M. Shakir
{"title":"Model of Faculty Experience in E-Learning Student Satisfaction","authors":"R. M. Tawafak, Ghaliya Alfarsi, M. Alnuaimi, Abdalla Eldow, S. I. Malik, M. Shakir","doi":"10.1109/CSASE48920.2020.9142071","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142071","url":null,"abstract":"There is a need for several models in the higher education institutions of the Middle East to improve both teacher and student satisfaction. This study investigates the influence of combining online learning with class communication on the enhancement of teaching methods and assessment techniques. This paper aims to enhance an e-learning model for improving faculty assessment. In the first part, an organized review of the previous literature articles was determined to test and compare the common criteria used in selecting factors such as student motivation, understanding, usage, and satisfaction. Then, design a compatible model that mixed up with an online E-Learning model with course work classes for assessing both student grade and skills performance in addition to evaluate the match of teaching method and course outcomes and learning. In this study, surveys were distributed to AlBuraimi University College in Oman to assess their satisfaction with teaching and assessment. The findings of this paper give highly acceptance of SPSS statistical results.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
CSASE 2020 Author Index CSASE 2020作者索引
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/csase48920.2020.9142108
{"title":"CSASE 2020 Author Index","authors":"","doi":"10.1109/csase48920.2020.9142108","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142108","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Relevance Feedback Based on Local Context 基于局部上下文的语义关联反馈
2020 International Conference on Computer Science and Software Engineering (CSASE) Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142115
Hadeel M. Awad, Waffa M. Saeed
{"title":"Semantic Relevance Feedback Based on Local Context","authors":"Hadeel M. Awad, Waffa M. Saeed","doi":"10.1109/CSASE48920.2020.9142115","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142115","url":null,"abstract":"Semantic similarity is a measure based on the meaning of the word and represented by the type of semantic relationships between the meanings of two words. The semantic similarity between words or sentences can be calculated by following the method, WordNet-based similarity. In our suggested method, the proposed solution depends on the two-step to return the target document collection. Once the top d1, d2…, dn documents have been retrieved using the initial query. The second compares these retrieved documents with the query, this step takes the most frequent senses of sentences in d1, d2…, dn with the senses of the query sentences. Query enrichment is then carried out adding terms semantically related to these senses the aim is to resolve the issue of incompatibility and the ambiguity problem affecting the results of information retrieval through the use of techniques to Word sense disambiguation (WSD) the word and the results be more semantically related with the query. Our experiment, carried out using part of the fire2011 data set.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信