2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)最新文献

筛选
英文 中文
Synthesis of Sugar Spheres to Fabricate Hydroxyapatite Scaffolds 糖球制备羟基磷灰石支架的研究
Adil Elrayah, Wael Hessen Alawad Alhessen, J. Weng, Esra Suliman
{"title":"Synthesis of Sugar Spheres to Fabricate Hydroxyapatite Scaffolds","authors":"Adil Elrayah, Wael Hessen Alawad Alhessen, J. Weng, Esra Suliman","doi":"10.1109/ICCCEEE49695.2021.9429648","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429648","url":null,"abstract":"In this study, a method to modify and fabricate pores into the surface’s walls of hydroxyapatite scaffolds, used d-fructose sugar spheres shapes. Thus, to improve their physical and biological properties which is necessary for bone regeneration. The sugar spheres were mixed into mineral oil under stirring. Then, the sugar spheres were drops in cold oil farther, the sugar sphere were harvested and classified with screens. Used sugar spheres as a template to prepare 3-D hydroxyapatite porous scaffolds. The sugar sphere curvatures shape could assist the porosity formed on the surface wall of HA scaffolds. After that, the morphologies of hydroxyapatite scaffolds had characterized by used optical microscope and scanning electron microscope (SEM). The results obtained that, the method was successfully produced pores on the surfaces walls of the HA scaffolds moreover, it also observed that both of steering speed and time could affect the size of sugar spheres.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Humidity Effect on Dust Storm Attenuation Prediction for 21 GHz Microwave Links in Sudan 湿度对苏丹21 GHz微波链路沙尘暴衰减预测的影响
E.I. Eltahir, E. A. Elsheikh, A. A. Babiker, I. Rafiqul, M. H. Habaebi, A. Abdulla, E. Saad, F. M. Suliman
{"title":"Humidity Effect on Dust Storm Attenuation Prediction for 21 GHz Microwave Links in Sudan","authors":"E.I. Eltahir, E. A. Elsheikh, A. A. Babiker, I. Rafiqul, M. H. Habaebi, A. Abdulla, E. Saad, F. M. Suliman","doi":"10.1109/ICCCEEE49695.2021.9429635","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429635","url":null,"abstract":"Dust storms affect the performance of microwave links. Several dust storm attenuation prediction models were proposed by researchers based on theoretical assumptions of either single - particle scattering theorems or numerical methods. The climate conditions and signal variations on microwave link operated at 21 GHz were monitored concurrently in Khartoum, Sudan for one year period. It was observed that dust storms are accompanied with increase of relative humidity and decrease in the received signal. The attenuation predicted by theoretical models and the measured attenuation at 21GHz were compared for a dry and humid case. The predicted attenuations in humid condition are varied significantly and increased 5 times more than dry dust condition. From these results it’s obvious that all the theoretical methods are unable to determine the attenuation of microwave propagation in dust storm at 21GHz and it’s essential to improve available models by considering the effect of humidity.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Method for Automating Voice Calls Routing Using Data Preprocessing Techniques for Supervised Learning 基于监督学习的数据预处理技术实现语音呼叫路由自动化的新方法
H. Mosa, Mohammed Aadil, Nawal Mustafa, H. Elshoush
{"title":"A New Method for Automating Voice Calls Routing Using Data Preprocessing Techniques for Supervised Learning","authors":"H. Mosa, Mohammed Aadil, Nawal Mustafa, H. Elshoush","doi":"10.1109/ICCCEEE49695.2021.9429667","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429667","url":null,"abstract":"In spite of the massive technological development in the telecommunications field globally, to transit and terminate international phone calls that are originated from one country to another is a process that requires much time and resources, which poses a great challenge. This paper proposes a new method for automated voice calls routing which automates the selection process for the appropriate carrier/channel of calls by creating a class label for quality statistics using data preprocessing for supervised learning while ensuring it complies with the requirements and conditions of the operator with its targeted quality of services. Data preprocessing tasks were performed on international calls duration records to automate the routing decision-making process in terms of sorting and prioritizing the routes of carriers who deliver the calls to the rightful destination. The methods used in the research were data cleaning to get rid of the noisy data, manual fill-in for the missing values, aggregation for data transformation, attribute subset selection in data reduction and finally creating a class label to determine the quality of each call and prepare the preprocessed data for supervised learning. The experimental results proved the efficiency of the proposed method and solved a great challenge that is facing telecom operators by saving operational costs and time.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isolated Word Speech Recognition Using Convolutional Neural Network 基于卷积神经网络的孤立词语音识别
Aljenan Soliman, Salah Mohamed, I. Abuel Maaly
{"title":"Isolated Word Speech Recognition Using Convolutional Neural Network","authors":"Aljenan Soliman, Salah Mohamed, I. Abuel Maaly","doi":"10.1109/ICCCEEE49695.2021.9429684","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429684","url":null,"abstract":"This research aims to design and develop an accurate speech recognition system for a set of predefined words collected from short audio clips. It uses The Speech Commands Dataset v0.01 provided by Google’s TensorFlow. Isolated word speech recognition can be implemented in voice user interfaces for applications with key-word spotting. The end goal is to classify and recognize ten words, along with classes for “unknown” words besides the “silence” class. The problems that face the current speech recognition technology like the acoustical noise and variations in recording environments are also solved and addressed here. To extract useful information from the signal, two methods of feature extraction were used: MFCCs and Mel-spectrograms. For classification, the convolutional neural network (CNN) was used. Different models were developed for this research, where each model has different architecture (1D-convnet and 2D-convnet). During training, techniques like batch normalization, regularization, and dropout were added to improve the accuracy and maintain the efficiency of the models. As a result of our experiments, The final model (2D-convnet with MFCC-16000) achieved an accuracy of 97.07% for training and 96.19% for testing.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Deep learning for Covid-19 Facemask Detection using Autonomous Drone Based on IoT 基于物联网的自主无人机深度学习新冠肺炎口罩检测
Elebaid Khalid Elsayed, A. Alsayed, Omer Mohammed Salama, Ali Mustafa Alnour, Hashim Ahmed Mohammed
{"title":"Deep learning for Covid-19 Facemask Detection using Autonomous Drone Based on IoT","authors":"Elebaid Khalid Elsayed, A. Alsayed, Omer Mohammed Salama, Ali Mustafa Alnour, Hashim Ahmed Mohammed","doi":"10.1109/ICCCEEE49695.2021.9429594","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429594","url":null,"abstract":"COVID-19 is a coronavirus-caused viral disease that had spread worldwide. Within over six months after its spread in China at the end of 2019, it infected over 10 million persons worldwide and more than 519,000 had perished. Drones are important in decreasing the range of COVID-19 disease outbreaks in most general applications, and especially in medical applications. This paper presents a new application of an autonomous Drone in fast detecting medical face masks by using Deep Learning to classify people based on their mask-wearing with high accuracy by using a classifier implemented based on MobileNetV2 architecture. The training carried out on an artificially created using Tensorflow, Opencv, and Keras. The autonomous Drone controlled by a smart mobile app with help of IoT technology such as the TeamViewer app, which controls the mobile, and the Qground control app to control the Drone through the MAV-link protocol. The objective of this paper is to use intelligent technology to decrease the spread of coronavirus to protecting people.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Contemporary DANCE in blinded Architecture (DANCISM Movement) 盲人建筑中的当代舞蹈(舞蹈主义运动)
Doaa Mustafa Hashim, AbuZaid Ahmed Albadri
{"title":"Contemporary DANCE in blinded Architecture (DANCISM Movement)","authors":"Doaa Mustafa Hashim, AbuZaid Ahmed Albadri","doi":"10.1109/ICCCEEE49695.2021.9429614","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429614","url":null,"abstract":"The scope of the research paper is the linkage of contemporary dance with architecture, in the exterior form of the high-rise building. The methodology used is the human dancing body followed by the elements of the contemporary dance. The result shows a new architecture approach; DANCISM Movement which shows a high rise building that looks as if it is dancing, just like the dancing human body.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison between Neural Networks and Binary logistic Regression for Classification Observation (Case Study: risk factors for cardiovascular disease) 神经网络与二元logistic回归分类观察的比较(以心血管疾病危险因素为例)
Ebtehag Mustafa Mohammed, Eyas G. Osman
{"title":"Comparison between Neural Networks and Binary logistic Regression for Classification Observation (Case Study: risk factors for cardiovascular disease)","authors":"Ebtehag Mustafa Mohammed, Eyas G. Osman","doi":"10.1109/ICCCEEE49695.2021.9429620","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429620","url":null,"abstract":"the distinction between the artificial neural network method and the logistic regression method was discussed in this study as one of the methods suggested to be used in dual-data response. That is for preference between the two used methods, we used the proportion of misclassified observations, model accuracy and the area under the curved ROC as a criterion to compare between the two methods. Accordingly, This hospital-based case-control study involved 750 cardiovascular disease cases and 50 controls all recruited from Madani Heart Centre in Sudan, in 2019, The study aimed at knowing the most important risk factors for cardiovascular disease, and comparison between the Binary Logistic model and the Neural Networks models, also recognition of the best statistical approaches between the two methodologies for processing such data. To process the data, the study used the (SPSS) version 25. The main results that the study reached that the two used methods are similar regarding the significance of both the effect and the importance of the independent variables considered in the analysis, but the method of artificial neural networks gained a better classification proportion than the Binary Logistic Regression model. The most important recommendations of the study that making use of the statistical methods and generalizing the application of both Neural Networks and Logistic model in all fields of knowledge.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121830478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticated Access Control for Vehicle Ignition System by Driver’s License and Fingerprint Technology 基于驾驶证和指纹技术的车辆点火系统认证访问控制
A. M. Ali, Heisum M. Awad, Ibrahim K. Abdalgader
{"title":"Authenticated Access Control for Vehicle Ignition System by Driver’s License and Fingerprint Technology","authors":"A. M. Ali, Heisum M. Awad, Ibrahim K. Abdalgader","doi":"10.1109/ICCCEEE49695.2021.9429666","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429666","url":null,"abstract":"The vehicles theft increase day by day rapidly and the ratio of unlicensed drivers also increase, which creates a major responsibility towards manufactures as well as owners of luxury automobile to inbuilt the antitheft system which prevent the cars from stole. In this thesis it designed security system for vehicles. This system includes arduino, driver’s license card (DL), Radio Frequency Identification reader (RFID), Fingerprint module (FP) and Global System for Mobile Communication modem (GSM). The arduino used to serve as entire brain of the system. It can add authorized driver’s license and fingerprints of trusted people into program burn in arduino. When any person enters driver’s license in RFID reader then will be compare to data existing in program if DL is authorized then move to place the finger in FP scanner to verify if match occur that will be ignition the system and this person can drive the car and if not Short Message Services (SMS) via GSM modem send to owner of vehicle and block the ignition system. Also SMS send to driver’s license holder to renewal DL before expiration.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic System to Calculate Working Hours for Machines and Operators 计算机器和操作人员工作时间的自动系统
Mohamed Abdelrahim
{"title":"Automatic System to Calculate Working Hours for Machines and Operators","authors":"Mohamed Abdelrahim","doi":"10.1109/ICCCEEE49695.2021.9429572","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429572","url":null,"abstract":"This paper represents designing an electronic system consists of hardware and software that can calculate the total working hours of machines for calculating depreciation and the total working hours of operators to know overtime automatically and accurately Without a report from an engineer or supervisor. Many machines can be connected easily to the system and protected from users so that only an administrator can access the system and see the report that comes from the machines and operators, this report cannot be manipulated in any way. Machine’s and operator’s costs represent an important part of the total cost of any operation however they are sometimes hard to calculate especially for individual operations. In this system we are using Raspberry pi as a computer Arduino RFID and XAMPP to design a localhost website.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Optimization of Heterogeneous WSNs using Successive Addition and Reduction Methods 基于逐次加减简方法的异构WSNs能量优化
Safa Y. Mahgoub, S. Babiker
{"title":"Energy Optimization of Heterogeneous WSNs using Successive Addition and Reduction Methods","authors":"Safa Y. Mahgoub, S. Babiker","doi":"10.1109/ICCCEEE49695.2021.9429626","DOIUrl":"https://doi.org/10.1109/ICCCEEE49695.2021.9429626","url":null,"abstract":"This paper presents two methods, Successive Addition Method (SAM) and Successive Reduction Method (SRM) for maximizing lifetime in Heterogeneous wireless sensor networks (HWSNs). The HWSNs have different sensing capabilities and different power transmit and battery lifetimes. In this study a known set of heterogeneous wireless sensors are randomly deployed. The simulation results show that the two methods are effective for maximizing the lifetime of HWSNs.","PeriodicalId":359802,"journal":{"name":"2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信