2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)最新文献

筛选
英文 中文
Phishing for Legitimacy: The Use of SSL Certificates to Ensnare Internet Users 网络钓鱼的合法性:使用SSL证书诱骗互联网用户
Mohammed Awad, Aisha El Allam, Khouloud Salameh, Reem Al Mazrouei
{"title":"Phishing for Legitimacy: The Use of SSL Certificates to Ensnare Internet Users","authors":"Mohammed Awad, Aisha El Allam, Khouloud Salameh, Reem Al Mazrouei","doi":"10.1109/ICECTA57148.2022.9990241","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990241","url":null,"abstract":"This paper examines the impact of making Hypertext Transfer Protocol Secure (HTTPS) certificates more accessible to the public. On the one hand, such an approach facilitates the process for small and large businesses to acquire certifications from Certificate Authorities (CAs), making their clients feel secure. On the other hand, such accessibility enabled many phishers to take advantage of this and pose as legitimate entities. This paper illustrates the phishers' eagerness to imitate existing websites. Furthermore, we will explore the role and responsibility of several parties, namely the Certificate Authority (CA), the browser provider, the website, and the Internet users. The paper also analyzes the results of a survey conducted to determine university students' understanding of HTTPS meaning and offers recommendations to overcome this issue.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121640891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of Ultra-Wideband Koch Fractal Microstrip Patch Antenna 超宽带科赫分形微带贴片天线的设计与分析
Amjad Omar, Amal Alnuaimi, F. Alhammadi, Mouza Bin Thaleth, Ali. S. AlNuaimi, Mousa I. Hussein
{"title":"Design and Analysis of Ultra-Wideband Koch Fractal Microstrip Patch Antenna","authors":"Amjad Omar, Amal Alnuaimi, F. Alhammadi, Mouza Bin Thaleth, Ali. S. AlNuaimi, Mousa I. Hussein","doi":"10.1109/ICECTA57148.2022.9990522","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990522","url":null,"abstract":"This paper is intended to design a microstrip antenna with reduced size and ultrawide bandwidth that operates in the FCC band (3-11 GHz). To increase the bandwidth, a Koch fractal was used that consists of side corrugations of the original rectangular patch. Furthermore, to improve the matching, a tapper has been used and the ground plane shape has been changed from rectangular to semicircular. The return loss, gain, efficiency, radiation pattern, and current distribution were obtained using the commercial software HFSS. The designed antenna was fabricated and measured with good agreement between HFSS simulations and measurements. The size of the proposed antenna was found to be smaller than other microstrip antennas operating in the same frequency band.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126362789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of CNNs in Home Security cnn在家庭安防中的应用
Ramaprasad Poojary, Roma Raina, S. Krishanmurthy
{"title":"Application of CNNs in Home Security","authors":"Ramaprasad Poojary, Roma Raina, S. Krishanmurthy","doi":"10.1109/ICECTA57148.2022.9990490","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990490","url":null,"abstract":"This study uses a deep learning model to detect the existence of a flame in an unused kitchen burner. This can also be used to sound an alarm or warn people who need to know. In this paper, a deep learning model is developed using transfer learning from the well-known Inceptionv3 Convolutional Neural Network (CNN) model. After that, the results are compared to a model created using the ResNet50 pretrained model. Originally, the Inceptionv3 and ResNet50 models were trained to distinguish up to 1000 image classes. Flame-On and Flame-Off are two image classes used in the proposed work. A total of 276 photos from two image classes make up the training dataset. Data augmentation including flipping, scaling, and rotation is used to increase the diversity of training data. When tested for 50 test images, the inceptionv3-based model surpasses the ResNet50-based model with a validation accuracy of 98 percent and a test accuracy of 94 percent. The proposed models are built and trained using the Matlab Deep Network Designer tool with predetermined training options.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voiced Features and Artificial Neural Network to Diagnose Parkinson’s Disease Patients 语音特征与人工神经网络诊断帕金森病患者
R. Islam, E. Abdel-Raheem, M. Tarique
{"title":"Voiced Features and Artificial Neural Network to Diagnose Parkinson’s Disease Patients","authors":"R. Islam, E. Abdel-Raheem, M. Tarique","doi":"10.1109/ICECTA57148.2022.9990334","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990334","url":null,"abstract":"This paper presents an algorithm to detect Parkinson’s disease using voiced features and an artificial neural network (ANN). It uses 44 audio features extracted from the sustained vowel’/a/’ sound of the Parkinson’s disease patients and healthy subjects. To fully characterize a healthy and a Parkinson’s patient’s voice, audio features of different domains have been investigated. A simple two-layer feed-forward neural network (FFNN) has been deployed to avoid an overwhelming computational burden on the system. Significant statistical parameters are measured to evaluate the performance of the proposed algorithm. The simulation results show that the proposed algorithm achieves an accuracy of 85% and G-mean of 85.19% in identifying Parkinson’s patients.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131707903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controller Design and Analysis for Octorotor UAVs 旋翼无人机控制器设计与分析
Mohamad Alansari, Ahmed M. Elshamy, Ahmed Abughali, Khalid Alhammadi
{"title":"Controller Design and Analysis for Octorotor UAVs","authors":"Mohamad Alansari, Ahmed M. Elshamy, Ahmed Abughali, Khalid Alhammadi","doi":"10.1109/ICECTA57148.2022.9990041","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990041","url":null,"abstract":"Radar applications that include emergency rescues and natural disasters damage evaluations are critical and difficult to be done by humans. It was proposed to use small Unmanned Aerial Vehicles (UAVs) in such applications because a UAV does not require a human pilot in it. In this work, an Octorotor with an altitude and attitude controller and observer are designed to control the vertical take-off and landing of the Octorotor is proposed. In addition, after reaching a certain altitude, a trajectory controller is designed using linear quadratic regulator (LQR) controller to move the Octorotor in x-, y-directions and to allow a translational movement at a constant velocity. Finally, a simulation was done to experiment the behaviour of the system under wind disturbance. A linearized model was extracted from the nonlinear model of the Octorotor. The results of both controllers clearly outperformed previous work. The model results were obtained via MATLAB/Simulink.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132202095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Microwave Assisted Coalescence of Binary Water Drops in Crude Oil 原油中二元水滴的在线微波辅助聚结
I. Adeyemi, N. Kharoua, M. Méribout, Khalid Alhammadi, L. Khezzar
{"title":"Online Microwave Assisted Coalescence of Binary Water Drops in Crude Oil","authors":"I. Adeyemi, N. Kharoua, M. Méribout, Khalid Alhammadi, L. Khezzar","doi":"10.1109/ICECTA57148.2022.9990404","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990404","url":null,"abstract":"In this study, the online microwave heating and coalescence of water droplets in crude oil was examined numerically. The online flow velocities of the emulsions are 10 and 50mm/s. Moreover, the effect of microwave power including 100, 500, 1000, 2000 and 5000W/m on coalescence performance parameters were assessed. In addition, microwave frequencies of 915MHz and 2.45GHz were studied. The coalescence time and microwave energy were lower at 10mm/s. The coalescence time and energy which were 220ms and 55.88J at 50mm/s was lowered to 100ms and 25.4J at 10mm/s. This phenomenon can be associated with the flow fluctuations at increased velocities which inhibited the coalescence dynamics. This study provides insights on the behavior of online microwave heating and coalescence for water-in-crude oil emulsions.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subject Authentication using Textural Features of Recurrence Plot 基于递归图纹理特征的主体认证
T. Alotaiby, S. Alshebeili, Gaseb Alotibi, Gaith Alotaibi
{"title":"Subject Authentication using Textural Features of Recurrence Plot","authors":"T. Alotaiby, S. Alshebeili, Gaseb Alotibi, Gaith Alotaibi","doi":"10.1109/ICECTA57148.2022.9990081","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990081","url":null,"abstract":"Increasing dependence on online transactions combined with continuing developments in information systems have led to a demand for accurate, reliable subject identity authentication systems. Various biometric-based technologies for identify authentication have already been proposed, including face, retina, and fingerprint recognition. However, this study, proposes an authentication system based on textural features extracted from the recurrence plot (RP) of three physiological signals:Photoplethysmography(PPG), Electrocardiogram (ECG) and Capnograms (CO$_{mathbf{2}}$). The signals are divided into segments from which a recurrence plot is generated. From there, textural features are extracted to form feature vectors subsequently fed into classifiers for user identity authentication. These classifiers are random forest (RF), naïve Bayes (NB), linear discriminant analysis (LDA), and support vector machine (SVM). This work also investigates the fusing feature vectors of different physiological signals into a single feature vector. The most promising results using feature vectors of individual signal: PPG, ECG, and CO$_{mathbf{2}}$, were obtained using RF classifier with segment lengths of 5.5 and 18 seconds; this approach achieved an average accuracy of 98.74%, 98.36%, and 98.41%, respectively. The fused features of the three signals also provided very promising results using an RF classifier, with an average accuracy of 99% and 99.31% using segment lengths of 2 and 15 seconds.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121054260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid CNN-LSTM Speaker Identification Framework for Evaluating the Impact of Face Masks 基于混合CNN-LSTM的人脸识别框架
Mohamed Bader, I. Shahin, A. Ahmed, N. Werghi
{"title":"Hybrid CNN-LSTM Speaker Identification Framework for Evaluating the Impact of Face Masks","authors":"Mohamed Bader, I. Shahin, A. Ahmed, N. Werghi","doi":"10.1109/ICECTA57148.2022.9990138","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990138","url":null,"abstract":"Following the declaration of COVID-19 as a worldwide pandemic, hindering a multitude number of lives, face mask exploitation has become extremely crucial to barricade the emanation of the virus. The masks available in the market are of various sorts and materials and tend to affect the speaker’s vocal characteristics. As a result, optimum communication may be hampered. In the proposed framework, a speaker identification model has been employed. Also, the speech corpus has been captured. Then, the spectrograms were obtained and passed through a two-stage pre-processing. The first stage includes the audio samples. In contrast, the second stage has targeted the spectrograms. Afterward, the generated spectrograms were passed into a hybrid Convolutional Neural Network- Long Short-Term Memory (CNN-LSTM) model to perform the classification. Our proposed framework has shown its capability to identify speakers while they are wearing face masks. Moreover, the system has been evaluated on the collected dataset, where it has attained 92.7%, 92.62%, 87.71%, and 88.26% in terms of accuracy, precision, recall, and F1-score, respectively. The acquired findings are still preliminary and will be refined further in the future by data expansion and the employment of numerous optimization approaches.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115290297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sudoku Binary Codes and Signaling Schemes for the Applications of Radar and Wireless Communications 雷达和无线通信中应用的数独二进制码和信令方案
M. G. Hussain, R. Narayanan
{"title":"Sudoku Binary Codes and Signaling Schemes for the Applications of Radar and Wireless Communications","authors":"M. G. Hussain, R. Narayanan","doi":"10.1109/ICECTA57148.2022.9990043","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990043","url":null,"abstract":"In this paper, the popular Sudoku puzzle that is a square 9 x 9 matrix, arranged into 3 x 3 blocks, is used to generate new binary coded sequences that are attractive for the applications of radar and wireless communications. Each of the Sudoku codewords corresponds to the set of decimal integer numbers 1 to 9 placed in the Sudoku matrix in a unique pattern, referred to as permutation, such that each row, each column, diagonal, and each 3 x 3 block contains each of the nine integers exactly once. The signal model and the autocorrelation function of the Sudoku binary coded sequences are presented. Multicarrier (MC) code division multiple access (CDMA), and frequency-hopping (FH) CDMA signaling schemes, widely used in wireless communications and radar, are described based on the use of Sudoku binary codes.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectuating Communication for the Deaf and Hard-of-Hearing: An Ethnographic Review 聋人与听力障碍者有效沟通:民族志评论
S. S. Kamath, Andrina Martin, Ramaprasad Poojary
{"title":"Effectuating Communication for the Deaf and Hard-of-Hearing: An Ethnographic Review","authors":"S. S. Kamath, Andrina Martin, Ramaprasad Poojary","doi":"10.1109/ICECTA57148.2022.9990196","DOIUrl":"https://doi.org/10.1109/ICECTA57148.2022.9990196","url":null,"abstract":"The Deaf and Hard-of-Hearing constitute a significant populace, raising the need for technology, which is becoming ubiquitous in the world, to become more accessible for them. This paper enlists recent efforts and research popular in the accessibility sphere for the DHH and asks research questions based on the review. The DHH Demographic are scattered around the world, and while there exists an International Sign Language, people tend to utilize their regional versions of the Sign Language, impeding solidarity. Systems, representations, and interpretations of the different Sign Languages are divergent. Hence, this paper examines research done solely in the sphere of different renditions of the Sign Language. This paper also discerns certain challenges and suggests how technology can work towards accurate interpretation and communication for the DHH. The use of Computer Vision and Deep Learning Algorithms is especially prevalent in current research, and this paper focuses on identifying some novel frameworks and procedures which have varied and deep applications in the accessibility sphere, not just for the DHH. The purpose of this review paper is to understand current research methods and encourage collaboration of version-specific researchers to further and ameliorate research.","PeriodicalId":337798,"journal":{"name":"2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信