2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)最新文献

筛选
英文 中文
Design of digital apodization technique for medical ultrasound imaging 医学超声成像数字化取证技术的设计
S. Mohamed, Elaf D. Mohamed, Mohamed F. Elshikh, M. Hassan
{"title":"Design of digital apodization technique for medical ultrasound imaging","authors":"S. Mohamed, Elaf D. Mohamed, Mohamed F. Elshikh, M. Hassan","doi":"10.1109/ICCEEE.2013.6633997","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633997","url":null,"abstract":"Ultrasound imaging is one of the important noninvasive techniques used in medical diagnosis. Unfortunately, the far field beam pattern in ultrasound is a sinc function, which has a better main lobe (the resolution of ultrasound imaging) and high side-lobe about -13dB down from the maximum on axis value (the contrast of ultrasound imaging). The result for that is one of a famous artifact in medical ultrasound that the anatomy of the organ outside the main beam to be mapped into the main beam. In this work we used different types of FIR filter to round edges of the aperture that taper towards zero at the ends of the aperture to create low side-lobe levels and reduce the false echo. We used the windowing function (Blackman, Kaiser (β=10), Parzen and Bohman) as apodization function to the reconstructed image to reduce the effect of the side-lobes. We computed the SNR for each image as well as for the main lobe and the side-lobe. The results showed that there is trade-off in selecting these functions: the main lobe of the beam broadens as the side-lobes lower. However, Kaiser (β =10) gave the best SNR (188.75 db) and best compensation between the contrast and resolution (main lobe=1.10 db and the side-lobe= -71.7 db). We found that if we use the Kaiser filter (β =10) this would reduce the side-lobe and improve the false echo in the ultrasound imaging.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"344 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the cache performance of the information centric network 信息中心网络的缓存性能研究
S. Hassan, Z. Aziz, K. Nisar
{"title":"On the cache performance of the information centric network","authors":"S. Hassan, Z. Aziz, K. Nisar","doi":"10.1109/ICCEEE.2013.6633985","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633985","url":null,"abstract":"The current Internet model has proved more sustainable then the provisioned capacity at the time when the architecture was designed. The voluminous growth of traffic over the Internet has brought challenges for the exiting networking architecture. The information centric paradigm appears to offer efficient solution towards content dissemination model. It is a content-focused networking paradigm rather than host-to-host communication. Caching is one of the major components of information centric networks. This paper is intended to explore the impact of cache on critical attributes of networks. We have made a comparative analysis of in-network and edge network caching mechanism using network simulation. The results proved that in-network caching mechanism is far better than network edge caching with improved throughout, increase link capacity to avoid congestion.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient design of Dual Digital Up Converter for WCDMA and CDMA2000 using system generator 利用系统发生器高效设计WCDMA和CDMA2000双数字上变频器
Mohamed Osman Suliman Omara
{"title":"Efficient design of Dual Digital Up Converter for WCDMA and CDMA2000 using system generator","authors":"Mohamed Osman Suliman Omara","doi":"10.1109/ICCEEE.2013.6633921","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633921","url":null,"abstract":"This paper presents an efficient method to design Dual Digital Up Converter (DUC) for WCDMA and CDMA2000 for Software Defined Radios (SDRs). The proposed Design which includes a programmable DDS, mixer and three cascaded stages of programmable digital filters has been simulated with Matlab, designed with Xilinx system generator and synthesized with Xilinx Synthesis Tool (XST) targeting Spartan 3A based xc3sd1800a FPGA. The Dual-mode feature is achieved by using a control unit which loads the filters coefficients of each system from ROM to the programmable digital filters upon desired System. The programmable DDS module is generated by Xilinx DDS Compiler and can operate at maximum frequency of 61.44MHz and provide the flexibility for multi-carrier base station. The results show that the system design flow based on Xilinx System Generator is simple and feasible and meets the performance requirements for the downlink transmit path for each system. The proposed design is consuming very less resources available on target device to provide cost effective solution for SDR based wireless applications.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Credit scoring using data mining techniques with particular reference to Sudanese banks 信用评分使用数据挖掘技术,特别参考苏丹银行
Eiman Kambal, I. Osman, Methag Taha, Noon Mohammed, Sara Mohammed
{"title":"Credit scoring using data mining techniques with particular reference to Sudanese banks","authors":"Eiman Kambal, I. Osman, Methag Taha, Noon Mohammed, Sara Mohammed","doi":"10.1109/ICCEEE.2013.6633966","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633966","url":null,"abstract":"One of the key success factors of lending organizations in general and banks in particular is the assessment of borrower credit worthiness in advance during the credit evaluation process. Credit scoring models have been applied by many researchers to improve the process of assessing credit worthiness by differentiating between prospective loans on the basis of the likelihood of repayment. Thus, credit scoring is a very typical Data Mining (DM) classification problem. Many traditional statistical and modern computational intelligence techniques have been presented in the literature to tackle this problem. The main objective of this paper is to describe an experiment of building suitable Credit Scoring Models (CSMs) for the Sudanese banks. Two commonly discussed data mining classification techniques are chosen in this paper namely: Decision Tree (DT) and Artificial Neural Networks (ANN). In addition Genetic Algorithms (GA) and Principal Component Analysis (PCA) are also applied as feature selection techniques. In addition to a Sudanese credit dataset, German credit dataset is also used to evaluate these techniques. The results reveal that ANN models outperform DT models in most cases. Using GA as a feature selection is more effective than PCA technique. The highest accuracy of German data set (80.67%) and Sudanese credit scoring models (69.74%) are achieved by a hybrid GA-ANN model. Although DT and its hybrid models (PCA-DT, GA-DT) are outperformed by ANN and its hybrid models (PCA-ANN, GA-ANN) in most cases, they produced interpretable loan granting decisions.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132121088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
FEM model of electrostatically actuated MEMS temperature sensor 静电驱动MEMS温度传感器的有限元模型
A. Atia, M. Ibrahim, Omer Abdul-Jabbar, Musaab Hassan
{"title":"FEM model of electrostatically actuated MEMS temperature sensor","authors":"A. Atia, M. Ibrahim, Omer Abdul-Jabbar, Musaab Hassan","doi":"10.1109/ICCEEE.2013.6633959","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633959","url":null,"abstract":"Micro electromechanical system (MEMS) is an emerging technology that gives high accuracy and high speed with least error due to the micro dimension. To design a simple but accurate MEMS sensors remains a challenge. Modeling of a MEMS temperature sensor, using simple microcantilever structure, is represented in this paper. The sensor is actuated electrostatically. The effect of temperature on the resonance was calculated ANSYS software. The device was made of copper (contact electrode), silicon (vibrating part) and silicon oxide (insulation layer). When the temperature varies the properties of the MEMS device also changes and hence the resonance frequency.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing a security model to protect websites from cross-site scripting attacks using ZEND framework application 使用ZEND框架应用程序开发安全模型,保护网站免受跨站脚本攻击
Yousra Faisal Gad Mahgoup Elhakeem, Bazara I. A. Barry
{"title":"Developing a security model to protect websites from cross-site scripting attacks using ZEND framework application","authors":"Yousra Faisal Gad Mahgoup Elhakeem, Bazara I. A. Barry","doi":"10.1109/ICCEEE.2013.6634012","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634012","url":null,"abstract":"The growth of the Internet in recent years has led to the spread of information crimes in renewed and changing ways. This paper is focused on understanding the issues surrounding cross-site scripting attacks and providing a simple and effective security model to protect websites from such attacks using ZEND framework application. The security model is based on a sequence of levels and is built using a combination of tools. Tests against a set of cross-site scripting attacks show the proposed model effectiveness and convenience.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Benefit cost analysis in appraisal and planning projects of higher learning institutions 高校项目评估与规划中的效益成本分析
M. S. Javed, Ahmad Kamil Bin Mahmood, Suziah Bt Sulaiman
{"title":"Benefit cost analysis in appraisal and planning projects of higher learning institutions","authors":"M. S. Javed, Ahmad Kamil Bin Mahmood, Suziah Bt Sulaiman","doi":"10.1109/ICCEEE.2013.6633903","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633903","url":null,"abstract":"Benefit Cost Analysis is a technique used for assessing the impacts of proposed actions in a project planning process. Under available resource constraints, accurate Benefit Cost Analysis provides a better economic choice among the projects. The main objective of the study is to address issues of Benefit Cost Analysis in project planning processes. A case study of the higher learning institution project of Pakistan is carried out wherein application and implications of Benefit Cost Analysis upon the project are evaluated and discussed. This study highlighted the significance of the correct estimation of benefits and costs in project appraisal and planning. For a more comprehensive appraisal and realistic outcomes, consideration should be given to the determination of accurate benefits and costs of a project.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134271263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Differential evolution cluster-based text summarization methods 基于差分进化聚类的文本摘要方法
Albaraa Abuobieda, N. Salim, M. Binwahlan, A. H. Osman
{"title":"Differential evolution cluster-based text summarization methods","authors":"Albaraa Abuobieda, N. Salim, M. Binwahlan, A. H. Osman","doi":"10.1109/ICCEEE.2013.6633941","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633941","url":null,"abstract":"In this paper, three similarity measures; Normalized Google Distance (NGD), Jaccard and Cosine Similarity measures were employed and tested for textual based clustering problem. A robust evolutionary algorithm called Differential Evolution algorithm was also used to optimize the data clustering process and increase the quality of the generated text summaries. The Recall Oriented Under Gisting Evaluation (ROUGE) was used as an evaluation measure toolkit to assess the quality of the summaries. Experimental results showed that all of our proposed methods outperformed the benchmark methods. More importantly, the Jaccard-similarity based method surpassed all the other proposed methods in this study.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Bandwidth adaptation for joint call admission control to support QoS in heterogeneous networks 联合呼叫接纳控制的带宽自适应,支持异构网络中的QoS
J. J. George, Nada Mustafa Abdalla
{"title":"Bandwidth adaptation for joint call admission control to support QoS in heterogeneous networks","authors":"J. J. George, Nada Mustafa Abdalla","doi":"10.1109/ICCEEE.2013.6633911","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633911","url":null,"abstract":"Call admission control (CAC) is one of the basic mechanisms for ensuring high quality of service (QoS) offered to the user in Wireless Networks. Based on the available network resources, it estimates the impact of accepting or blocking a new session request. Many CAC algorithms have been proposed in the literature but they were all limited by the available bandwidth. This paper proposes a bandwidth adaptation technique for the Adaptive Joint CAC (AJCAC) algorithm; it is proposed as a solution for congestion; where the AJCAC algorithm degrades the bandwidth of some ongoing users to make room for new incoming ones. A restoration process must take place when the network is underutilized; where the algorithm restores the maximum bandwidth service to the degraded users. In this paper the bandwidth degradation process was investigated and evaluated. The results showed that as the degradation in the bandwidth increases, the adaption required in the network also increases. On the other hand, degradation in the QoS results in decreasing the blocking probability","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of different techniques for Brain Computer Interfacing 脑机接口不同技术的性能分析
M. R. Hasan, M. Ibrahimy, S. Motakabber
{"title":"Performance analysis of different techniques for Brain Computer Interfacing","authors":"M. R. Hasan, M. Ibrahimy, S. Motakabber","doi":"10.1109/ICCEEE.2013.6634031","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634031","url":null,"abstract":"Recent works on different types of Brain Computer Interface (BCI) and their performance analysis have provided some remarkable features for applications. The aim of this work is to compare the accuracies of different types of BCI to find out the suitable techniques. The study shows that each technique performance depends on the type of BCI. A batter performance of the BCI systems is supported by the artificial neural network.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信