2021 International Conference on Electronic Engineering (ICEEM)最新文献

筛选
英文 中文
Adaptive Fractional Order Sliding Mode Control for a Nonlinear System 非线性系统的自适应分数阶滑模控制
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480657
E. Mostafa, Ahmad M. El-Nagar, O. Elshazly, M. El-Bardini
{"title":"Adaptive Fractional Order Sliding Mode Control for a Nonlinear System","authors":"E. Mostafa, Ahmad M. El-Nagar, O. Elshazly, M. El-Bardini","doi":"10.1109/ICEEM52022.2021.9480657","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480657","url":null,"abstract":"An adaptive fractional order sliding mode controller (AFOSMC) is introduced in this study to control a nonlinear system. This controller includes two units. The primary unit is a fractional order sliding mode control unit which incorporates the sliding mode and the fractional order control features. Second unit is employed for online adjusting the parameters of fractional order sliding mode controller by using a fuzzy logic system. The control performance of FOSMC with various control problems is improved by the tuning of its parameters. In addition, stability analysis of the proposed controller is studied with employing Lyapunov theorem. The efficiency of the developed scheme is investigated by applying it to a van der pol oscillator system. Simulation results indicate the improvements of the developed AFOSMC under disturbances and variation of desired output. Also, the proposed controller has less settling time and rise time compared with another existing controller.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malweb: An Efficient Malicious Websites Detection System using Machine Learning Algorithms Malweb:一个使用机器学习算法的高效恶意网站检测系统
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480648
A. E. El-Din, Ezz El-Din Hemdan, A. El-Sayed
{"title":"Malweb: An Efficient Malicious Websites Detection System using Machine Learning Algorithms","authors":"A. E. El-Din, Ezz El-Din Hemdan, A. El-Sayed","doi":"10.1109/ICEEM52022.2021.9480648","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480648","url":null,"abstract":"These days, malware is one of the supreme acknowledged cyber threats. As data volumes increase rapidly, the number of malware threats increases. Malware not only increases in quantities but also becomes smarter and more difficult to detect. Detect malware threats on websites caused by high data traffic, becomes a challenging problem, which must be solved. Moreover, billions of dollars are lost annually due to malicious website scams. Applying analytics to discover new information, predict future malware insights, and make control decisions is a critical process that makes online websites secure. In this research, we propose and analyze a machine learning-based system to detect the behavior of malicious websites based on specific features. With these features, we classify websites as either malicious versus non-malicious. This paper employs a variety of machine learning techniques, including Logistic Regression, Decision Tree, and Naïve Bayes to detect malicious and non-malicious websites, based on various feature selection circumstances to improve results. Applying feature selection with a new way depends on the threshold of categories so Reasonable results are reached with 100% accuracy, recall, and precision when applying Logistic Regression and Decision Tree algorithms while 95% when applying a Naïve Bayes algorithm with an acceptable timing slot.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133245127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Wavelet - Fuzzy Combination Based Approach for Efficient Cancer Characterization in Breast Ultrasound Images 基于小波-模糊组合的乳腺超声图像肿瘤特征识别方法
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480631
S. Badawy, Hassan E. Zidan, A. Mohamed, A. Hefnawy, Mohammed T. GadAllah, Ghada M. El-Banby
{"title":"A Wavelet - Fuzzy Combination Based Approach for Efficient Cancer Characterization in Breast Ultrasound Images","authors":"S. Badawy, Hassan E. Zidan, A. Mohamed, A. Hefnawy, Mohammed T. GadAllah, Ghada M. El-Banby","doi":"10.1109/ICEEM52022.2021.9480631","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480631","url":null,"abstract":"Breast ultrasound (BUS) images are commonly influenced by speckle noise as a result of the phenomenon. Most types of speckle noise are a multiplicative one. Speckle removing while preserving image’s edges and image’s contrast is a challenge. More researches have been done throw the literature trying to fix a development at this point. Here, a modest scheme based on combining wavelet denoising and intuitionistic fuzzy enhancement has been proposed. Also, double thresholding image segmentation followed by some morphological operations were applied after the proposed approach. The proposed approach has been applied with a sonogram image of a breast having a benign cancer. Performance evaluation of the work has been achieved utilizing four quantitative metrics: mean square of error (MSE), peak signal to noise ratio (PSNR), structural similarity index measure (SSIM), and the quantitative metric of edges’ conservation: Pratt’s figure of merit (FOM). Also, the method has been applied by a BUS image with a malignant cancer and a gray scale phantom. The final quantitative as well as qualitative results confirmed that the introduced approach could achieve an efficient success into breast cancer characterization through BUS images’ investigation, helping in better clinical diagnosis and more explicit detection for breast cancers.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique SCKHA:一种新的基于密钥哈希和分割技术的流密码算法
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480652
Samia Souror, N. El-Fishawy, M. Badawy
{"title":"SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique","authors":"Samia Souror, N. El-Fishawy, M. Badawy","doi":"10.1109/ICEEM52022.2021.9480652","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480652","url":null,"abstract":"Cryptographic algorithms are playing an important role in the information security field. Strong and unbreakable algorithms provide high security and good throughput. The strength of any encryption algorithm is basically based on the degree of difficulty to obtain the encryption key by such cyber-attacks as brute. It is supposed that the bigger the key size, the more difficult it is to compute the key. But increasing the key size will increase both the computational complexity and the processing time of algorithms. In this paper, we proposed a reliable, effective, and more secure symmetric stream cipher algorithm for encryption and decryption called Symmetric Cipher based on Key Hashing Algorithm (SCKHA). The idea of this algorithm is based on hashing and splitting the encryption symmetric key. Hashing the key will hide the encrypted key to prevent any intruder from forging the hash code, and, thus, it satisfies the purpose of security, authentication, and integrity for a message on the network. In addition, the algorithm is secure against a brute-force attack by increasing the resources it takes for testing each possible key. Splitting the hashed value of the encryption key will divide the hashed key into two key chunks. The encryption process performed using such one chunk based on some calculations on the plaintext. This algorithm has three advantages that are represented in computational simplicity, security and efficiency. Our algorithm is characterized by its ability to search on the encrypted data where the plaintext character is represented by two ciphertext characters (symbols).","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133498366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[ICEEM 2021 Front cover] [ICEEM 2021封面]
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/iceem52022.2021.9480374
{"title":"[ICEEM 2021 Front cover]","authors":"","doi":"10.1109/iceem52022.2021.9480374","DOIUrl":"https://doi.org/10.1109/iceem52022.2021.9480374","url":null,"abstract":"","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Track Donation System Using Blockchain 使用区块链的跟踪捐赠系统
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480649
Eisa Shaheen, Mohamed Abdl Hamed, Walaa Zaghloul, Eman Al Mostafa, Amr El Sharkawy, A. Mahmoud, Amira Labeb, Marwa O Al Enany, G. Attiya
{"title":"A Track Donation System Using Blockchain","authors":"Eisa Shaheen, Mohamed Abdl Hamed, Walaa Zaghloul, Eman Al Mostafa, Amr El Sharkawy, A. Mahmoud, Amira Labeb, Marwa O Al Enany, G. Attiya","doi":"10.1109/ICEEM52022.2021.9480649","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480649","url":null,"abstract":"Charities face a difficult funding environment, mainly because charities are not highly transparent. Day over day It became more difficult to know whether donations are reaching the right place, or taking another course, such as financing suspicious campaigns, terrorist projects, etc. As a result, donors lose faith in these organizations, leading to a halt to interactions with charitable organizations. This makes it more difficult for charities to raise money at a great cost. This research proposed a solution to the mentioned problem using Blockchain technology, a decentralized database that provides security, transparency, and lower funding cost by eliminating the presence of third parties between donors and charities. A new track donation model was proposed which introduced several new participants that control the process of donation and remove suspicion of the charity. All donations can be tracked in Blockchain, allowing donors to know where and how their money is being used. The proposed model was implemented using Hyperledger composer then it was tested to obtain a live full track of a donation process. All donations are made using smart contracts, which allow donors to know exactly when and how their donations will be received. The Blockchain track donation system results in time-saving, reducing the cost of donation, and reduces the risk of reaching suspicious campaign donations or terrorist projects. A website was created as a facilitator for users for ease of use of the proposed system.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and analysis of a new undergraduate Computer Engineering degree – a methodoligical approach serving the future dynamically changing workplace 设计和分析一个新的本科计算机工程学位-一个方法论的方法服务于未来动态变化的工作场所
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480608
Wael Badawy
{"title":"Design and analysis of a new undergraduate Computer Engineering degree – a methodoligical approach serving the future dynamically changing workplace","authors":"Wael Badawy","doi":"10.1109/ICEEM52022.2021.9480608","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480608","url":null,"abstract":"A new proposal from NATIONAL ACADEMIC REFERENCE STANDARDS (NARS-2018) to restructure engineering degrees including Computer Engineering. A transformation from 180 Credit hours with 165 Credit hours for a four years degree beyond a first-year named preparation year in engineering. This paper present a methodology to restructure programs to meet the marketplace. The new market prediction of a domination of Artificial Intelligence application in the industry by 2030, however there is a lower level of adoption. The slower adoption presents a challenge for a curriculum design as we aim to stabilize the course offering, generate market-ready students while being dynamic enough to produce graduate with knowledge for a dynamic marketplace once AI-related graduate are thought after from the industry.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A similarity measure for interval type-2 fuzzy sets applied to fuzzy risk analysis 区间2型模糊集的相似性测度在模糊风险分析中的应用
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480660
I. M. Sharaf, Talaat Abdelhamid
{"title":"A similarity measure for interval type-2 fuzzy sets applied to fuzzy risk analysis","authors":"I. M. Sharaf, Talaat Abdelhamid","doi":"10.1109/ICEEM52022.2021.9480660","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480660","url":null,"abstract":"Similarity measures are one of the most significant tools for reasoning in a fuzzy environment. While several similarity measures handle type-1 fuzzy sets, only a few handle type-2 fuzzy sets. This article proposes a similarity measure for trapezoidal interval type-2 fuzzy sets (TrIT2FSs). The proposed similarity measure avoids the flaws of the extant similarity measures for TrIT2FSs. It is a simple method and its calculations are easily performed. The method is a generalization of a similarity measure for generalized type-1 fuzzy sets and an extension of a similarity measure for interval-valued fuzzy sets with simplifications. The method is based on the perimeters, the heights, and the geometric distances of the upper and lower membership functions. A problem in fuzzy risk analysis is solved to illustrate the applicability of the proposed similarity measure to solve these problems.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Mechanism for Video Streaming on Peer-to-Peer Networks using OPNET 基于OPNET的对等网络视频流动态机制
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480375
Amira Refaat Mohamed, A. El-Sayed, Mohamed S. AbedMotelb, Hanaa Elturkey
{"title":"Dynamic Mechanism for Video Streaming on Peer-to-Peer Networks using OPNET","authors":"Amira Refaat Mohamed, A. El-Sayed, Mohamed S. AbedMotelb, Hanaa Elturkey","doi":"10.1109/ICEEM52022.2021.9480375","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480375","url":null,"abstract":"Quality for live video streaming technology is based on quality Experiences parameters (QoE). Approaching the peer-to-peer (P2P) or peer-assisted networks like sympathetic solution is highly required, especially in light of its authentic scalability and its extremely low initial cost requirements. However, the design of robust, efficient, and performing P2P streaming systems remains a big challenge when real-time necessity are partnof the quality for service. One of the P2P main issues is the neighbor selection methodology. The proposed work is an operative mesh-based neighbor selection algorithm for live video streaming based on QoS and QoE Parameters. We simulates different scenarios up to 4000 online peers under failure / recovery tests. The simulation results demonstrates that the proposed algorithm achieves good performance in end-to-end dela variation..A new algorithm “UPDA” used to improve streaming quality though a new neighbor selection methodology. This categories peers into super peer and slow peer.\"APDA\" algorithm that defines the role of each peer existing in the streaming session. With the coming of services and applications such as media and videos streaming over the internet. some server service model a client must made request to the video server,CDN (Content Delivery Network ) approximation a set of CDN server are set on at the network instead by downloading the video from the multimedia server.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115938616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Detection of Breast Cancer using Microstrip Patch Antenna 利用微带贴片天线早期检测乳腺癌
2021 International Conference on Electronic Engineering (ICEEM) Pub Date : 2021-07-03 DOI: 10.1109/ICEEM52022.2021.9480646
Donia N. Elsherif, Mostafa Y. Makkey
{"title":"Early Detection of Breast Cancer using Microstrip Patch Antenna","authors":"Donia N. Elsherif, Mostafa Y. Makkey","doi":"10.1109/ICEEM52022.2021.9480646","DOIUrl":"https://doi.org/10.1109/ICEEM52022.2021.9480646","url":null,"abstract":"Breast cancer is one of the most common and life-threatening diseases among women. Hence, early diagnosis is important to detect cancer tissue. But the common techniques used for breast cancer detection have limitations. So, microwave imaging (MWI) techniques were developed. MWI techniques are rather interesting and promising. In this paper, a rectangular microstrip patch antenna (RMPA) was designed and modified for breast cancer detection. And a breast phantom was modeled with tumor and without tumor using Computer Simulation Technology Microwave Studio (CST-MWS). Once the breast tumor is embedded within, the results showed that the current density, the magnetic field, the electric field, and the power loss density have been increased by 30 A/m2, 10 A/m, 1800 V/m, and 100000 W/m3, respectively. These results show that the described RMPA is capable to detect the tumor in the breast with better characteristics than the other available designs in the literature.","PeriodicalId":352371,"journal":{"name":"2021 International Conference on Electronic Engineering (ICEEM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信