{"title":"Fault tolerant heterogeneous scheduling for precedence constrained task graphs using simulated annealing","authors":"Hassan A. Youness, A. Omar, M. Moness","doi":"10.1109/ICCES.2013.6707224","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707224","url":null,"abstract":"Scheduling is known to be an NP complete problem in most cases that has no optimal solution in polynomial time. Scheduling task graphs on heterogeneous architecture increases the difficulty of the problem. These heterogeneous architectures like any other platforms are prone to faults thus fault tolerance techniques must be used to ensure accomplishment of the job therefore task replication is used to achieve fault tolerance. However scheduling complexity is increased and the schedule length is affected dramatically due to duplication. Also task replication introduces great communication delays overhead. Here we propose the use of simulated annealing optimization method to find optimal solution according to platform reliability, where the algorithm can be used to minimize lower bound makespan on high reliability platforms and genuinely optimize upper bound makespan for platforms that are prone to failures.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust methodology for solder joints extraction","authors":"M. Abdelhameed, M. A. Awad, Hend M. Abd El-Aziz","doi":"10.1109/ICCES.2013.6707217","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707217","url":null,"abstract":"In Electronic Manufacturing Industry, machine vision systems have been announced to outperform the electrical inspection systems effectively. It supports the Surface Mount Technology (SMT) and improves the diagnostic capabilities. The challenge there is to miniaturize components with high packing density under economic considerations. This paper presents a front-end automatic detection system tackles with the solder joint specularity, illumination variations and recognition misalignment problems. This can be achieved by enhancing the threshold-based segmentation method using Discrete Cosine (DCT).","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high-rate chaotic secured covert channel based on multiple embedding in images","authors":"Ashraf Seleym","doi":"10.1109/ICCES.2013.6707220","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707220","url":null,"abstract":"Covert channel is a type of secure communications that provides reliable security in transferring information between entities. Quantization Index Modulation (QIM) technique can be used to embed data in images to implement covert communication channels. In single embedding in QIM, each sample is quantized once to carry a single bit of the secret message. Double embedding in QIM was introduced by Sarkar and Manjunath in 2009, to increase the transferred data rate where a single sample is quantized twice to carry two bits in time. In this paper, a higher data transmission rate covert channel is developed using multiple embedding in the QIM framework with multi quantization vectors. This approach considers the embedding process as a communications problem, that it uses a structured scheme of Multiple Trellis-Coded Quantization jointed with Multiple Trellis-Coded Modulation (MTCQ/MTCM) to generate the stego-space. This technique returns a PSNR ≥ 40 dB. More over, increasing the coding states and/or the coding multiplicity returns an altered space with low correlated coefficients, thus improving the transferred data detection error rate performance. To secure the modulation process, the altered coefficients are chaotic scrambled by the 2-D Arnold Cat Map before embedding to increase the uncertainty in case of an attacker discovered the channel.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured steganography algorithm based random function","authors":"Hamdy M. Mousa","doi":"10.1109/ICCES.2013.6707209","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707209","url":null,"abstract":"In this paper, we propose modified least significant bit steganography technique in order to make the technique more secure and hence less predictable. In this technique, the function and threshold value are randomly generated that used to encrypt the secret message using bit exchange method. The encrypted message is embedded into host image. Experimental results demonstrate that proposed technique has multilayer protection stages against different attacks and it can defeat many existing steganalytic attacks and higher level of security based on the function parameters and threshold values. Stego images quality is acceptable because of the difference between histograms of the host image and its stego-image is negligible and all obtained PSNR values exceed 50 dB.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QT correction for fiducial ECG features based biometric systems","authors":"M. Tantawi, M. Tolba, A. Salem, K. Revett","doi":"10.1109/ICCES.2013.6707196","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707196","url":null,"abstract":"In this paper, an electrocardiogram (ECG) based biometric system is proposed. A QT correction step is introduced to obviate the impact of heart rate variability, instead of just normalizing the features by the corresponding RR duration. Consequently, both approaches were examined in this work. Two sets of fiducial features were investigated: a super set of 36 features and a reduced version of it. Radial basis functions neural network is used as a classifier. The evaluation of the system was performed on the basis of subject identification (SI) accuracy and heartbeat recognition (HR) accuracy. The experiments were conducted using a 50-subject database and the results revealed the superiority of the QT correction approach, especially over time.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NNMonitor: Performance modeling for database servers","authors":"AbdAlhamid Khattab, Alsayed Algergawy, A. Sarhan","doi":"10.1109/ICCES.2013.6707223","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707223","url":null,"abstract":"Database Management Systems (DBMSs) are the cores of most information systems. Database administrators (DBAs) face increasingly more challenges due to the systems growing complexity and must be proficient in areas, such as capacity planning, physical database design, DBMS tuning and DBMS management. Furthermore, DBAs need to implement policies for effective workload scheduling, admission control, and resource provisioning. In response to these challenges we focus our attention on the development of online DBMS performance model. We aim to meet service level agreements (SLAs) and maintain peak performance for DBMS. To this end, we propose a neural network-based performance model called NNMonitor that can predict the performance metrics of DBMS online and determines if the DBMS needs to tune or not before entering into a complex tuning process. We make use of neural networks to build our proposed model taking into account the interaction among concurrently executing queries and predict throughput. The experimental evaluation demonstrates that this model is capable of predicting the performance metrics of real database servers with high accuracy.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"495 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saud Alrumaih, A. Alghaihab, A. Ragheb, T. Alshawi, S. Alshebeili, H. Fathallah
{"title":"FPGA-based implementation of channel-blind adaptive equalizers","authors":"Saud Alrumaih, A. Alghaihab, A. Ragheb, T. Alshawi, S. Alshebeili, H. Fathallah","doi":"10.1109/ICCES.2013.6707204","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707204","url":null,"abstract":"Inter-Symbol Interference (ISI) is a major obstacle for reliable communication over band-limited or multi-path channels as it results in overlapped symbols at the receiver, and therefore, elevated bit-error rate. This limitation reduces the potential performance gains of high order modulation schemes to be used in modern communication standards. Blind equalization algorithms can solve such problem without the reduction in data rate that is associated with data-aided equalizers. In this paper we propose a Field Programmable Gate Array (FPGA) implementation of adaptive fractionally spaced (FSE) blind equalizer, which is both efficient and scalable. The implementation results are provided and its real-time performance on a 2-by-2 Multi-Input Multi-Output (MIMO) channel using 16-QAM modulation is validated by measuring against simulation results.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124133132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of dynamic resource allocation in cloud computing platforms using Stochastic Process Algebra","authors":"D. Shawky","doi":"10.1109/ICCES.2013.6707168","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707168","url":null,"abstract":"Cloud computing is a revolutionary concept in which computing services are provided to end users via virtualization. Computing resource are provisioned and released on demand. This elastic nature of resource provisioning allows for the “pay as you go” concept. Hence, it makes the major benefit of adopting cloud-based solutions. Accordingly, there is a need to evaluate the performance of the resource provisioning algorithm adopted by cloud computing platforms. In this paper, an approach for modeling and analyzing the performance of the resource provisioning process in a cloud computing platform is presented. The proposed model utilizes Stochastic Process Algebra (SPA) as an engine to simulate the components involved in the resource provisioning process along with the interactions among them. A case study using the cloud computing platform Aneka is performed. Experimental results show the effect of different parameters on the provisioning process which suggests the suitability of the proposed approach to evaluate design alternatives.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation and comparison of the top market virtualization hypervisors","authors":"A. Elsayed, Nashwa Abdelbaki","doi":"10.1109/ICCES.2013.6707169","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707169","url":null,"abstract":"The virtualization of IT infrastructure enables the consolidation and pooling of IT resources so that they can be shared over diverse applications to offset the limitation of shrinking resources and growing business needs. It provides a logical abstraction of physical computing resources and creates computing environments that are not restricted by physical configuration or implementation. Virtualization is very important for cloud computing because the delivery of services is simplified by providing a platform for optimizing complex IT resources in a scalable manner, which makes cloud computing more cost effective. Hypervisor plays an important role in the virtualization of hardware. It is a piece of software that provides a virtualized hardware environment to support running multiple operating systems concurrently using one physical server. The hypervisor type introduces significant impacts on the virtualization environment performance. The intent of this paper is to quantitatively and qualitatively compare the performance of the latest shipping versions of the VMware ESXi5, Citrix Xen Server 6.0.2 and Hyper-Hyper-V2008R2 Hypervisors at time of this study using customized SQL instance as workload simulating real life situations. This Paper helps both IT decision makers and end users to choose the right virtualization hypervisor and their readiness for enterprise datacenters and cloud infrastructure.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trust management system for ad-hoc mobile clouds","authors":"A. Hammam, S. Senbel","doi":"10.1109/ICCES.2013.6707167","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707167","url":null,"abstract":"Most current cloud provisioning involves a data center model, in which clusters of machines are dedicated to running cloud infrastructure software. Ad-hoc mobile clouds, in which infrastructure software is distributed over resources harvested from machines already existed and used for other purposes, are gaining popularity. In this paper, a trust management system (TMC) for mobile ad-hoc clouds is proposed. This system considers availability, neighbors' evaluation and response quality and task completeness in calculating the trust value for a node. The trust management system is built over PlanetCloud which introduced the term of ubiquitous computing. EigenTrust algorithm is used to calculate the reputation trust value for nodes. Finally, performance tests were executed to prove the efficiency of the proposed TMC in term of execution time, and detecting node behavior.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132838863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}