Z. Alansari, N. B. Anuar, A. Kamsin, M. R. Belgaum, S. Soomro
{"title":"Quality of Service in Wireless Sensor Networks using Cellular Learning Automata","authors":"Z. Alansari, N. B. Anuar, A. Kamsin, M. R. Belgaum, S. Soomro","doi":"10.1109/iCCECE49321.2020.9231123","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231123","url":null,"abstract":"Wireless Sensor Networks (WSNs) have different Quality of Service (QoS) parameters from those of traditional networks. Several considerations utilized for evaluating QoS include appropriate number of active nodes, network lifetime, network coverage, and resource utilization. One of the features of Cellular Learning Automata (CLA), besides its simple learning structure, is learning in distributed and multi-hop environments with limited communications and incomplete information. CLA benefit show how different problems in WSNs can be overcome. In this paper, the underlying issues of WSNs are discussed, and in order to improve the QoS parameters, efficient solutions have been proposed using CLA. The WSN 's environmental coverage issue is also addressed by turning off redundant nodes and maintaining adequate nodes to conserve resources and enhance network life. In this research, the issue of clustering of WSNs is addressed and the WSNs are clustered by using CLA to efficiently distribute energy to the network and maximize network life. All provided methods are simulated by J-Sim tools showing the overall reduce in WSN energy consumption and also for each node alone. Moreover, we demonstrate the reduce in data communication overhead and maintaining the overall network coverage. Simulation experiments indicate higher performance of the proposed methods than other associated approaches.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"29 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Transmission and Repository Platform for Electronic Medical Images: Case Study of Retinal Fundus in Teleophthalmology","authors":"Soha M Gamal, S. Youssef, Ayman A. Abdel-Hamid","doi":"10.1109/iCCECE49321.2020.9231144","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231144","url":null,"abstract":"Securing electronic medical information has a significant impact on data access which directly affects patient’s privacy and quality care rights. Medical professionals need to have full access to all patients' medical history to make accurate decisions regarding diagnosis and treatment plans. This paper introduces a novel Secure framework that integrates a new hybrid encryption scheme of medical images using chaotic maps and 2D Discrete wavelet transform (DWT) Steganography to increase key size and achieve high security level. In addition, a web-based monitoring platform has been deployed for tracking of electronic medical records during transmission. To validate the efficiency of the proposed framework, an application case-study has been introduced for securely transmitting retinal fundus medical images for diagnostic decisions on diabetic patients. Compared to the state-of-the-art approaches, the proposed framework demonstrated the ability to mask the context of the confidential patient into a transmitted cover image with high imperceptibility and limited degradation in the stego image provided in acceptable cryptographic overhead. Experimental results demonstrated that the proposed framework outperforms other schemes in terms of accuracy, sensitivity and perceptibility.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of an IT security measurement method for the evaluation of IT security in micro-enterprises","authors":"M. Heidenreich","doi":"10.1109/iCCECE49321.2020.9231113","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231113","url":null,"abstract":"This paper presents a proposal for an application-oriented implementation of an existing multidimensional IT security measurement method. The result is a software tool (IT-Tool) which is used to measure the internal and external perspective on the IT security of an enterprise. The measured values are being classified with the help of a defined metric into different IT security levels. The aim of the self-measurement IT-Tool is to increase the IT security awareness of the enterprise by comparing the internal and external perspective as well as to derive concrete measures to improve the IT security of the enterprise. The entire IT security measurement method is based on the multiple German industry IT security framework conditions and is initially designed for craftwork micro-enterprises (1 – 9 employees). In addition, a suggestion for the evaluation of the tool presented here is described.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational Perturbation Methods for Moderator and Doppler Temperature Coefficients in the European Pressurised Reactor Core Analysis","authors":"Jinfeng Li","doi":"10.1109/iCCECE49321.2020.9231053","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231053","url":null,"abstract":"Moderator temperature coefficient (MTC) and fuel Doppler temperature coefficient (DTC) are both the key reactivity coefficients for the safety assessment of a nuclear fission reactor core. Conventional unidirectional perturbing computation exhibits a limited scope in understanding the full-core physics. To better assist the energy policy decision making, this work contributes two different perturbation approaches to characterise the temperature coefficients of reactivity, i.e. by perturbing the moderator (or fuel) temperature while keeping the core power, or by perturbing the power while keeping the moderator (or fuel) temperature. Multi-physics computational codes suite (WIMS-PANTHER-Serpent) is employed to simulate and benchmark the startup core behavior of a nuclear new build currently occurring in the UK. Reasonably good agreements with the nuclear reactor physics are demonstrated computationally for both perturbation methods.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khandaker Foysal Haque, Fatin Farhan Haque, L. Gandy, A. Abdelgawad
{"title":"Automatic Detection of COVID-19 from Chest X-ray Images with Convolutional Neural Networks","authors":"Khandaker Foysal Haque, Fatin Farhan Haque, L. Gandy, A. Abdelgawad","doi":"10.1109/iCCECE49321.2020.9231235","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231235","url":null,"abstract":"Deep Learning has improved multi-fold in recent years and it has been playing a great role in image classification which also includes medical imaging. Convolutional Neural Networks (CNN) has been performing well in detecting many diseases including Coronary Artery Disease, Malaria, Alzheimer’s disease, different dental diseases, and Parkinson’s disease. Like other cases, CNN has a substantial prospect in detecting COVID-19 patients with medical images like chest X-rays and CTs. Coronavirus or COVID-19 has been declared a global pandemic by the World Health Organization (WHO). Till July 11, 2020, the total COVID-19 confirmed cases are 12.32 M and deaths are 0.556 M worldwide. Detecting Corona positive patients is very important in preventing the spread of this virus. On this conquest, a CNN model is proposed to detect COVID-19 patients from chest X-ray images. This model is evaluated with a comparative analysis of two other CNN models. The proposed model performs with an accuracy of 97.56% and a precision of 95.34%. This model gives the Receiver Operating Characteristic (ROC) curve area of 0.976 and F1-score of 97.61. It can be improved further by increasing the dataset for training the model.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coronary Artery Disease Detection from PCG signals using Time Domain based Automutual Information and Spectral Features","authors":"Sagar Suresh Kumar, V. K","doi":"10.1109/iCCECE49321.2020.9231107","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231107","url":null,"abstract":"This paper proposes a quick, compact and cost-effective point-of-care stethoscope-based device that detects Coronary Artery Disease (CAD) from phonocardiogram (PCG) signals, i.e. Recordings of heart sounds, compared to existing methods which are either expensive or are unable to diagnose until the conditions too severe. PCG signals are extracted from patients using a condenser microphone mounted on a stethoscope and is followed by amplification and filtering. The signals are passed through the laptop using an audio jack and digitized. Thereafter they are segmented into the 4 states S1, systole, S2 and diastole using a Hidden Semi Markov Model (HSMM). Afterwards, the diastolic phases are isolated and both time and frequency domain features are analyzed. In the time domain, features are extracted using a nonlinear function, the Automutual Information. In the frequency domain, both high and low-frequency domain features were extracted. A Support Vector Classifier using a Radial Basis Function was trained on 190 recordings from the 2016 PhysioNet/Cinc challenge and obtained an accuracy of 0.74, indicating the combined use of both time and frequency measures from PCG signals could be viable. Such a product could be of great use to clinicians as a quick, inexpensive and primary means of checking whether or not a patient has CAD.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Recognition Performance Analysis for Noncooperative Conditions","authors":"Oktay Koç, A. Uka, Maaruf Ali, Klevis Muda, Orges Balla, Albana Roci","doi":"10.1109/iCCECE49321.2020.9231089","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231089","url":null,"abstract":"A biometric system is presented using the human iris to help determine the authenticity of an individual. The system extracts the unique features of the iris that are recorded in templates. These templates are then compared with other irides utilising Daugman’s method. This follows a strict procedure (including segmentation, normalization, encoding and matching) over which a user has complete control. Often the recognition phase is crucial in nonoptimal or noncooperative conditions. In this work, a comparison is made of the relative accuracy of utilizing noisy iris datasets. The performance is analysed for a different number of iris images per person, for different number of individuals, for different noise levels using three different segmentations and three different encoding schemes. Adjustment of the Gabor filters’ bandwidth used in the encoding stage proves to be decisive in improving the accuracy for higher noise levels.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116510657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Cybersecurity Challenges and Awareness for Children of all Ages","authors":"Zeeshan Siddiqui, Nida Zeeshan","doi":"10.1109/iCCECE49321.2020.9231229","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231229","url":null,"abstract":"Children are considered an easy prey to many cybersecurity threats. This is due to the lack of awareness of such threats while using smart devices, like smartphones. In most of the cases, not only children but their parents are also unaware of these security threats. Therefore, in this research, we have performed a comprehensive survey on various aspects of cybersecurity threats and its awareness among children. Such as, online safety and security for children, security control challenges and cybersecurity challenges for children and parents. We have also performed a security test to demonstrate the effectiveness of built-in security and privacy settings of such devices. For this purpose, we have used the built-in security and privacy settings of an iPhone 11 and performed various usage tests on unrestricted and restricted mode. The tests and observations have proved that the built-in security and privacy controls, such as Screen Time or Parental Controls, are the most effective way to safeguard children from various Cybersecurity threats they may face during their use of such devices and lack of cybersecurity awareness.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucas Conde, Gustavo Souza, Yuri Souza, Flávio R. S. Nunes, M. Takeda, Adalbery R. Castro, A. Klautau
{"title":"SoC FPGA-based Beacon Emulator Platform for a Three-Axis Satellite Antenna","authors":"Lucas Conde, Gustavo Souza, Yuri Souza, Flávio R. S. Nunes, M. Takeda, Adalbery R. Castro, A. Klautau","doi":"10.1109/iCCECE49321.2020.9231170","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231170","url":null,"abstract":"Satellite tracking techniques are constantly being developed and improved so that stable communication links between satellites and terrestrial stations can be established. However, the implementation of such techniques can be frequently limited due to the complexity in reproducing satisfying test scenarios, manipulating and interpreting signals from those systems. Therefore, this paper proposes a method to manipulate the power signals of a three-phase induction motor (responsible for the movement of an antenna in a satellite tracking system) in order to apply them to a system able to emulate the behavior of the beacon signal (the reference signal for satellites). For that, the hardware project of a beacon and limit switches (LSs) emulators, motor rotation frequency meters, and rotation direction detectors will be presented. This was implemented in a System-on-Chip (SoC) FPGA (Field Programmable Gate Array) platform. The described system enables hardware-in-the-loop simulations and the efficient assessment of satellite tracking algorithms.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}