2021 International Conference on Advanced Computer Applications (ACA)最新文献

筛选
英文 中文
Secure Medical Image Steganography Method Based on Pixels Variance Value and Eight Neighbors 基于像素方差值和8邻域的医学图像安全隐写方法
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626807
Mohammed K. Abed, M. M. Kareem, Raed Khalid Ibrahim, M. M. Hashim, S. Kurnaz, Adnan Hussein Ali
{"title":"Secure Medical Image Steganography Method Based on Pixels Variance Value and Eight Neighbors","authors":"Mohammed K. Abed, M. M. Kareem, Raed Khalid Ibrahim, M. M. Hashim, S. Kurnaz, Adnan Hussein Ali","doi":"10.1109/ACA52198.2021.9626807","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626807","url":null,"abstract":"The security aspect of processes and methodologies in the information and communication technology era is the main part. The security of information should a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganography system are facing several challenges such as the low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Variance (PV) method is proposed along with the eight neighbors method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In proposed method, a new image partitioning with Henon map is used to increase the security part and has three main stages (preprocessing, embedding, and extracting) each stage has different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters such as Peak signal-to-noise ratio (PSNR) and Structural Similarity Index (SSIM). In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolved the existing issues.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"49 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends 无线网络通信中的安全威胁——现状、挑战和未来趋势
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626810
Ahmed Najah Kadhim, S. Sadkhan
{"title":"Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends","authors":"Ahmed Najah Kadhim, S. Sadkhan","doi":"10.1109/ACA52198.2021.9626810","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626810","url":null,"abstract":"The wireless air interface is open and accessible to both authorized and unauthorized users due to the broadcast nature of radio propagation. In a wired network, communication equipment is connected via wires, and a station without a direct link is unable to connect to the network for illicit reasons. Wireless transmissions are more vulnerable to malicious assaults than wired transmissions due to the open communications environment, which includes both passive and active attackers for disrupting valid signals. First, we’ll go through wireless network security needs. Following that, a complete review of security assaults in wireless networks is provided, with potential security risks examined at each protocol layer, in light of the network protocol design. Finally, certain technological problems that have yet to be overcome at the time of writing are outlined, as well as anticipated developments in wireless security.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Generalized Contra and Strongly Contra Closed Graphs via δ-β-Open and Closed Sets 基于δ-β-开闭集的广义逆和强逆闭图
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626790
Ghassan. E. Arif, Alaa. M. F. Al-Jumaili, Abduljabar. K. Abbas
{"title":"On Generalized Contra and Strongly Contra Closed Graphs via δ-β-Open and Closed Sets","authors":"Ghassan. E. Arif, Alaa. M. F. Al-Jumaili, Abduljabar. K. Abbas","doi":"10.1109/ACA52198.2021.9626790","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626790","url":null,"abstract":"New classes of generalized closed and strongly closed graphs, namely, δ – β – closed, contra–δ – β – closed and strongly contra–δ – β – closed graphs in topological spaces are introduced and investigated by utilizing the notions of δ – β – open and closed sets. Several interesting characterizations and fundamental properties concerning of such these forms of generalized graphs are discussed.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127969609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-of-the-Art in QoE for Video streaming 最先进的QoE视频流
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626780
A. S. Ghafil, I. Ali
{"title":"State-of-the-Art in QoE for Video streaming","authors":"A. S. Ghafil, I. Ali","doi":"10.1109/ACA52198.2021.9626780","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626780","url":null,"abstract":"Videos have been the most commonly used source of entertainment on the Internet, accounting for 65% of the world’s Internet traffic in 2020. Efficient internet delivery of multimedia with low bandwidth requirements using DASH (Dynamic adaptive streaming HTTP) means better quality for the end-user and lower costs for the server. With HTTP streaming, it is possible to provide a weak quality of service (QoS), but a better quality of experience (QoE), because HTTP offers a stable meaning of transportation. In this paper, a comprehensive survey on the use of Machine learning (ML) for predicate QoE for user progress of this research area. Furthermore, what are the current trending algorithms in frontier ML research, and discuss why you prefer dealing with “HTTP DASH” describes the benefits of using QoE with HTTP webpage.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The roadmap towards 5G in Iraq: Challenges, Opportunities, and Required Procedures 伊拉克5G路线图:挑战、机遇和所需程序
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626795
Mustafa S. Aljumaily, Mustafa Taha Hussein Almusawi
{"title":"The roadmap towards 5G in Iraq: Challenges, Opportunities, and Required Procedures","authors":"Mustafa S. Aljumaily, Mustafa Taha Hussein Almusawi","doi":"10.1109/ACA52198.2021.9626795","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626795","url":null,"abstract":"The deployment of the fourth generation of wireless cellular communications (namely 4G) is already underway in Iraq. And like the 2G and 3G, the current deployment is almost 13 years behind the rest of the world. This delay in acquiring the latest technologies is costing the country a lot of losses economically, scientifically, and in all aspects of life. The fifth generation of wireless communications (namely called 5G) was starting to be deployed in different parts of the world by the end of 2018. This new generation will include many challenges with respect to the major changes to the networks infrastructures, applications, and use cases. Such Dramatic Changes can take many years to complete the transition. This paper is aimed to answer the question of what the Government, the operator companies, the vendors, and the potential customers need to do in order to complete the transition from 4G to 5G with minimum effort, time, and change to the already existing infrastructure taking in consideration the real need and expected usage of the 5G services. Site surveys, questionnaires, online polls, and comparative study with similar examples were used to conduct this study and the findings and recommendations are listed accordingly.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual Polarization and Frequency Reconfigurable Antenna based on Defect Ground Structure for Mid- Band 5G applications 基于缺陷接地结构的中频段5G双极化频率可重构天线
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626801
Alaa Imran Al-Muttairi, M. Farhan
{"title":"Dual Polarization and Frequency Reconfigurable Antenna based on Defect Ground Structure for Mid- Band 5G applications","authors":"Alaa Imran Al-Muttairi, M. Farhan","doi":"10.1109/ACA52198.2021.9626801","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626801","url":null,"abstract":"In this paper, (30*30*1.6) mm3, dual polarization and frequency reconfigurable antenna is proposed. The switchable Defect ground structure (DGS) technique is used to achieve frequency configurability with simple DC biasing circuit. The proposed antenna delivers dual linear polarization (Vertical and Horizontal). For each polarization state, antenna resonant frequency can be reconfigured independently between 3.5GHz and 3.6GHz with approximately constant impedance bandwidth (larger than 100MHz). Furthermore, the design antenna delivers gains of 3.4dB and 4dB for 3.5GHz band and 3.6GHz band respectively with acceptable cross polarization and port isolation levels which is better than −20dB. A good agreement between simulated and measured results are obtained. The designed antenna is a good candidate for 5G applications in order to increase spectrum efficiency.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116906688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering Document based Semantic Similarity System using TFIDF and K-Mean 基于TFIDF和K-Mean的聚类文档语义相似度系统
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626822
Rowaida Khalil Ibrahim, Subhi R. M. Zeebaree, Karwan Jacksi, M. A. Sadeeq, Hanan M. Shukur, A. Alkhayyat
{"title":"Clustering Document based Semantic Similarity System using TFIDF and K-Mean","authors":"Rowaida Khalil Ibrahim, Subhi R. M. Zeebaree, Karwan Jacksi, M. A. Sadeeq, Hanan M. Shukur, A. Alkhayyat","doi":"10.1109/ACA52198.2021.9626822","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626822","url":null,"abstract":"The steady success of the Internet has led to an enormous rise in the volume of electronic text records. Sensitive tasks are increasingly being used to organize these materials in meaningful bundles. The standard clustering approach of documents was focused on statistical characteristics and clustering using the syntactic rather than semantic notion. This paper provides a new way to group documents based on textual similarities. Text synopses are found, identified, and stopped using the NLTK dictionary from Wikipedia and IMDB datasets. The next step is to build a vector space with TFIDF and cluster it using an algorithm K-mean. The results were obtained based on three proposed scenarios: 1) no treatment. 2) preprocessing without derivation, and 3) Derivative processing. The results showed that good similarity ratios were obtained for the internal evaluation when using (txt-sentoken data set) for all K values. In contrast, the best ratio was obtained with K = 20. In addition, as an external evaluation, purity measures were obtained and presented V measure of (txt). -sentoken) and the accuracy scale of (nltk-Reuter) gave the best results in three scenarios for K = 20 as subjective evaluation, the maximum time consumed with the first scenario (no preprocessing), and the minimum time recorded with the second scenario (excluding derivation).","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implantation of a code synchronization circuit for DSSS DSSS代码同步电路的设计与实现
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626809
Zaid Sssdi Hussein, S. J. Mohammed, Kadhim Hassan Kaittan
{"title":"Design and implantation of a code synchronization circuit for DSSS","authors":"Zaid Sssdi Hussein, S. J. Mohammed, Kadhim Hassan Kaittan","doi":"10.1109/ACA52198.2021.9626809","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626809","url":null,"abstract":"Direct sequence spread spectrum communication system have played an outgrowing role in modern communication systems for both military and civil applications due to its unique features. Spread spectrum modulation systems initially design to send digital signal data under difficult conditions of a very low signal to noise ratio (SNR) due to the low signal level (transmission with low probability error). In this article, direct sequence spread spectrum communication system (DS/SS) with synchronization and tracking circuit inside it is designed and implemented using MATLAB/Simulink. This study designed and implemented all parts of synchronization system, such as active correlator, acquisition subsystem, tracking subsystem, search/lock control unit (SLCU) subsystems and local PN generator. Information can be send safely and received separately without knowing the code used in the sending circuit, this work achieves obtaining an optimum code in the receiving circuit similar to the code in the sending circuit by linking all the parts together.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radio Access Network Techniques Beyond 5G Network: A brief Overview 超越5G网络的无线接入网络技术:简要概述
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626804
Karar Ibrahim, S. Sadkhan
{"title":"Radio Access Network Techniques Beyond 5G Network: A brief Overview","authors":"Karar Ibrahim, S. Sadkhan","doi":"10.1109/ACA52198.2021.9626804","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626804","url":null,"abstract":"The fifth generation (5G) of mobile communication systems promises to give the greatest possible mobile service with better quality of service (QoS) to everyone, everywhere. In the future, expect to start new use cases for a variety of vertical industry app, like vehicles, public safety, cultivation, public transportation, energy, recreation, producing, and many more. User density, traffic volume, data rate, and other metrics are expected to expand rapidly in the future. In the coming decade, multiple solutions will be required to meet the needs of both mobile users and vertical industries. One solution that appears appealing among the different possibilities is to recreate the radio access network (RAN). This article provides a quick summary for researchers working in the topic of radio access networks (RAN). Also give a brief overview an intelligent RAN architectural framework built on Artificial Intelligence (AI) approaches that can be readily customized and managed for Beyond fifth Generation (B5G) applications, as well as an overview of key applications like smart cities and factories that are driving the transformation of current RAN techniques.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain and Smart Contracts to Improve Dental Healthcare for Children in Primary School 区块链和智能合约改善小学儿童的牙科保健
2021 International Conference on Advanced Computer Applications (ACA) Pub Date : 2021-07-25 DOI: 10.1109/ACA52198.2021.9626789
Wildan Mohammed Araby Al-Rubaye, S. Kurnaz
{"title":"Blockchain and Smart Contracts to Improve Dental Healthcare for Children in Primary School","authors":"Wildan Mohammed Araby Al-Rubaye, S. Kurnaz","doi":"10.1109/ACA52198.2021.9626789","DOIUrl":"https://doi.org/10.1109/ACA52198.2021.9626789","url":null,"abstract":"Privacy preserving is a matter of great importance in many sensitive fields including financial and healthcare areas. As the blockchain technology has achieved an obvious success in privacy protection at the financial level when the Bitcoin has been introduced in 2008, there are considerable attempts and later on successful projects to introduce the blockchain technology to the healthcare fields, where the patient privacy and access control to the personal information is at high priority. The aim of our paper mainly considers the introduction of the smart contracts that are based on the blockchain technology as a method to preserve the patient privacy and improve the reality of dental healthcare providing services.The main focus will be on the treatment plan of the patient by building a smart contract system between multiple partners. By using “the five types models” our proposed system has been built combining the advantages of blockchain technology and the benefits of smart contracts. The programming language that we have used is Solidity along with proof of authority algorithm on Ethereum blockchain. The proposed smart contract system which is based on blockchain technology can provide the privacy preservation of patient information in addition to the digitalization of healthcare data.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127471677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信