{"title":"Image steganography based on LSBMR using Sobel edge detection","authors":"Zohreh Fouroozesh, J. A. Al Ja'am","doi":"10.1109/ICEND.2014.6991368","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991368","url":null,"abstract":"Steganography is the science of embedding confidential data inside data so they can be sent to destination without suspicion. Image-steganography is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images. The least significant bit algorithm (LSB) is one of these algorithms that is widely used in steganography. Several improvements of this algorithm have been proposed recently. In this paper we study and analyze the LSB matching revisited (LSBMR) algorithm and the edge adaptive image steganography based on LSBMR. We conduct several experiments on these algorithms on a set of 200 images and we show that an improvement can be made by using some image processing technique called Sobel edge detection to find edges of the images that can hold the secret information. We show that the proposed technique can improve the quality of the steganography images where sharper edges are used for low capacity rate.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. B. Abdo, J. Demerjian, H. Chaouchi, Kabalan Barbar, G. Pujolle
{"title":"Cloud federation means cash","authors":"J. B. Abdo, J. Demerjian, H. Chaouchi, Kabalan Barbar, G. Pujolle","doi":"10.1109/ICEND.2014.6991189","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991189","url":null,"abstract":"Lots of effort, has been exerted by the research community, to optimize the investment and profit in cloud networks through the proposition of pricing models, SLA features and resource provisioning techniques. The majority of these contributions assumed that cloud federation enhances network's profitability due to the increase in resource utilization, but to the best of our knowledge, none has proven this assumption. In this paper, we will compare the Return-On-Investment in standalone and federated cloud networks and prove mathematically that federation increases the profit. We will also compare the theoretical utilization rates in both networks and finally deduce the above assumption.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive case study of the impact of multicast routing protocols on mobile health care training systems","authors":"A. Zarrad, A. Mahlous","doi":"10.1109/ICEND.2014.6991355","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991355","url":null,"abstract":"Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all of the healthcare disciplines, however research in this field still in its early stage. Increasingly, decision makers and developer look forward to offer more sophisticated, much larger, and more complex HCTS to serve the desired outcome and improve the quality and safety of patient care. Due to the rapidly increasing usage of personal mobile devices and the need of executing HCTS applications in environments that have no previous network infrastructure available, Mobile Health Care Training-based System (MHCTS) is an expected future trend. In such systems, medical staff will share and collaborate in a 3D virtual environment through their mobile devices in an ad-hoc network (MANET) in order to accomplish specific missions' typically surgical emergency room. Users are organized into various groups (Radiologists, Maternity departments, and General surgery etc.), and need to be managed by a multicast scheme to save network bandwidth and offer immersive sense. MHCTS are sensitive to networking issues, since interactive 3D graphics requires additional load due to the use of mobile devices. Therefore, we need to emphasize on the importance and the improvement of multicast techniques for the effectiveness of MHCTS and the management of collaborative group interaction. Research so far has devoted little attention to the network communication protocols design of such systems which is crucial to preserve the sense of immersion for participating users. In this paper, we investigate the effect of multicast routing protocol in advancing the field of Health care Training-based System to the benefit of patient's safety, and health care professional. A comprehensive analysis about various ad-hoc multicast routing protocols is proposed. The selection key factors for the right protocol for MHCTS applications were safety and robustness. To the best of our knowledge, this work will be the first initiative involving systematic literature reviews to identify a research gate for the use of multicast protocol in health care simulation learning community.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled Al Raj Ismaiil, B. Assaf, M. Ghantous, M. Nahas
{"title":"Reducing power consumption of cellular networks by using various cell types and cell zooming","authors":"Khaled Al Raj Ismaiil, B. Assaf, M. Ghantous, M. Nahas","doi":"10.1109/ICEND.2014.6991188","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991188","url":null,"abstract":"Nowadays, it is urgent to manage the power consumption in cellular networks due to the increased amounts of CO2. As a result, this increased amount of CO2 released leads to severe threats for global warming and to an increase in the energy cost in the base stations. This problem arouse as soon as the evolution of mobile networks emerged especially in the last decades. As a result, we have witnessed a massive growth in the number of base stations all over the world in order to serve these highly increasing demands on cellular traffic. Hence, mobile operators need to meet these new demands in wireless cellular networks, while they have to maintain reasonable costs to keep high benefits and maintain high quality of service at in addition to decreasing energy consumption. This is the concept of Green Communication. In our paper, we propose a new solution that will help in reducing energy consumption. The solution is a centralized algorithm applied in a heterogeneous Long Term Evolution (LTE) network using Macro and Micro base stations, applied with a new Control Server that will be implemented using a newly introduced server in evolved cellular networks.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124600136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Ghazi Hameed, Ban Salman Shukur, N. Al-khafaji, H. Al-Farhan
{"title":"Utilizing mobile applications as a channel of interaction between the citizens and the government: Design M-police in Iraq","authors":"Ahmed Ghazi Hameed, Ban Salman Shukur, N. Al-khafaji, H. Al-Farhan","doi":"10.1109/ICEND.2014.6991182","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991182","url":null,"abstract":"Mobile devices are currently assuming significant roles in our daily and business life. M-government is one of the revolutionary developments that come from the adoption of wireless mobile technologies in government activities. The International Telecommunication Union (2013) stated that a continuous growth of people worldwide use information and communication technologies along with the increasing number of services and applications offered over the Internet and on mobile devices. Thus, mobile technologies are enhanced with distinctive features that provide government agencies with more efficient and convenient services. The mobility provided by these technologies provides accessible and updated information real-time services available 24 hours a day, 7 days a week. This paper reduces the number of explosions in Iraq, which could be realized by utilizing modern technologies and promoting citizen participation in sending information regarding suspicious cars and situations. To achieve this goal, this paper utilizes the significant number of mobile phone users in Iraq. Thus, the system is designed (M-Police) via Android platforms that are widely used throughout the world.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"10 46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124734390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. K. Htike, Othman Omran Khalifa, H. A. Mohd Ramli, M. Abushariah
{"title":"Human activity recognition for video surveillance using sequences of postures","authors":"K. K. Htike, Othman Omran Khalifa, H. A. Mohd Ramli, M. Abushariah","doi":"10.1109/ICEND.2014.6991357","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991357","url":null,"abstract":"The Human activities recognition has become a research area of great interest as it has many potential applications; including automated surveillance, sign language interpretation and human-computer interfaces. In recent years, an extensive research has been conducted in this field. This paper presents a part of a novel a Human posture recognition system for video surveillance using one static camera. The training and testing stages were implemented using four different classifiers which are K Means, Fuzzy C Means, Multilayer Perceptron Self-Organizing Maps and Feedforward Neural networks. The accuracy recognition of used classifiers is calculated. The results indicate that Self-Organizing Maps shows the highest recognition rate. Moreover, results show that supervised learning classifiers tend to perform better than unsupervised classifiers for the case of human posture recognition. Furthermore, for each individual classifier, the recognition rate has been found to be proportional to the number of training postures. Performance comparisons between the proposed system and existing similar systems were also shown.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting exchange rates: Artificial neural networks vs regression","authors":"David Semaan, A. Harb, Abdallah Kassem","doi":"10.1109/ICEND.2014.6991371","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991371","url":null,"abstract":"Most exchange rates are volatile and mainly rely on the principle of supply and demand. Millions of people around the world are influenced, one way or another, by the variation in exchange rates. In this research we demonstrate that the Artificial Intelligence, specifically Artificial Neural Networks (ANN), can improve the accuracy of forecasting exchange rates compared to statistical techniques such as regression. When we compared the results from regression and artificial neural network, it was clear that the ANN outperformed regression in forecasting exchange rates. Moreover, it became clear that using ANNs instead of regression for forecasting exchange rates is rewarding and necessary because the average error given by an ANN is smaller than the average error given by regression. Accuracy in forecasting became a major issue and not a minor detail. It was the combination between Artificial Intelligence and Macro Economics that made these two models come into reality, making it possible to use computer sciences and engineering fields in the service of an economical problem.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122350396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farah Chaaban, N. Moubayed, Mirna Atieh, H. Tahini, O. Mustapha, Nizar F. Al Awar, M. Diab, Reem Abou Marak
{"title":"Utilization and modeling of an artificial muscle application on IPMC muscle","authors":"Farah Chaaban, N. Moubayed, Mirna Atieh, H. Tahini, O. Mustapha, Nizar F. Al Awar, M. Diab, Reem Abou Marak","doi":"10.1109/ICEND.2014.6991367","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991367","url":null,"abstract":"Artificial muscles are one of the most important applications of the technology of flexible electronic structure, designed to imitate human or animal muscles and to monitor its activities and conditions. The aim of our paper is to study the different possibilities of using and modeling artificial muscles.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124504110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Beainy, G. El-Jamal, Ziad Bou Sakr, N. Moubayed
{"title":"Mathematical modeling of pacemaker for study of battery longevity","authors":"A. Beainy, G. El-Jamal, Ziad Bou Sakr, N. Moubayed","doi":"10.1109/ICEND.2014.6991366","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991366","url":null,"abstract":"This paper examines the problem of longevity in pacemaker batteries. A mathematical model is elaborated. Several variations of stimulus currents and time are imposed and their results are studied. The given simulations show the effect of the current pulses on the charge consumption and the battery longevity. The range of values which assure the best system performance and the best battery protection from wear and depreciation is also discussed.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmoud El Kobi, M. Zein, A. A. Al Ghouwayel, Hussein Hijazi
{"title":"Decoding of short non-binary LDPC codes using a non iterative decoding algorithm","authors":"Mahmoud El Kobi, M. Zein, A. A. Al Ghouwayel, Hussein Hijazi","doi":"10.1109/ICEND.2014.6991187","DOIUrl":"https://doi.org/10.1109/ICEND.2014.6991187","url":null,"abstract":"In this paper, we investigate the decoding of short Non-Binary (NB)-LDPC codes of rate 1/2 using a non-iterative approach based on the Maximum-Likelihood (ML) principle. The traditional decoding algorithms used to decode the NB-LDPC codes are by nature iterative where the Variables Nodes (VN) and Check Nodes (CN) exchange data iteratively during, at least, eight iterations which imposes a long decoding time to achieve good performance in terms of Frame Error Rate (FER). In this paper we propose a decoding algorithm based on the Maximum Likelihood (ML) search named Near ML approach where the number of tested words considered as potential codewords is highly reduced. Simulation of codes of lengths 16 and 48 are presented and the results show that the proposed algorithm achieves the performance offered by the EMS algorithm. The NB-LDPC of length 16 is shown to outperform the EMS algorithm.","PeriodicalId":421311,"journal":{"name":"The Third International Conference on e-Technologies and Networks for Development (ICeND2014)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133216767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}