{"title":"Implementation of VLAN via Wireless Networks using OPNET Modeler","authors":"Tareq Al-Khraishi, Muhannad Quwaider","doi":"10.5121/csit.2019.91805","DOIUrl":"https://doi.org/10.5121/csit.2019.91805","url":null,"abstract":"A VLAN is a logical rather than physical connection that allows grouping hosts together in the same broadcast domain, so that packets are only delivered to ports that are combined to the same VLAN. By characteristic VLAN network, we can improve efficiency of wireless network and save bandwidth. Furthermore, implementing VLAN greatly improves wireless network security by decreasing the number of hosts that receive copies of frames broadcasted by switches, so hosts holding critical data are kept on a separate VLAN. This paper compares wireless network with wireless network having VLAN deployment. The proposed Network is evaluated in terms of average throughput and delay using file transfer in heavy traffic and web browsing applications. The simulation was carried out by employing OPNET 14.5 modeler simulation and the results show that the use of VLAN via wireless network had improved the performance by decreasing the traffic resulting in minimizing delay time. In addition, implementing VLAN reduces the network throughput because the traffic that is received and forwarded has a positive relationship with throughput. Furthermore, we investigated to improve the throughput in a wireless VLAN network by using adhoc routing protocols. Evaluation, comparison of broad adhoc routing protocols like AODV, DSR, OLSR, TORA and GPR are conducted in order to show the effect of the proposed VLAN on the performance results, like throughput and delay.","PeriodicalId":423710,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology and Architecture for Safety Management","authors":"Matthieu Carré, E. Exposito, J. Ibañez-Guzmán","doi":"10.5121/csit.2019.91801","DOIUrl":"https://doi.org/10.5121/csit.2019.91801","url":null,"abstract":"The design of complex systems, as in the case of autonomous vehicles, requires a specialized systems engineering methodology and an adapted modelling framework. In particular, the integration of non-functional requirements, as important as the Safety, requires from this methodological framework the well-adapted semantic expression of constraints as well as their traceability during all phases of analysis, design and implementation. This paper focuses on the study of model-based autonomous system design and investigates the design flows and initiatives grasping with this complex computational model. The specialization of the ARCADIA methodology will be illustrated in a real industrial case.","PeriodicalId":423710,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132144368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hayam R. Seireg, A. Elmahalawy, Yasser Omar, A. El-Fishawy, F. El-Samie
{"title":"Performance Evaluation of Multi Agent Agriculture System using Markov Processes","authors":"Hayam R. Seireg, A. Elmahalawy, Yasser Omar, A. El-Fishawy, F. El-Samie","doi":"10.5121/csit.2019.91807","DOIUrl":"https://doi.org/10.5121/csit.2019.91807","url":null,"abstract":"The multi agent agriculture system is a new application in AI to solve the problem of food shortage in the world and to decrease the gap between agriculture production and the need of people. In this paper we explorer the modeling and simulation of the new trend of the agriculture using AI with Markov processes. Simulation is used to check the performance of the proposed model. Steady state analysis of the proposed model is given. The steady state performance indicates that, the agriculture automation can close the gap between the actual production and the need of people. The main goal of using the multi-agents technology is to achieve high precision agriculture.","PeriodicalId":423710,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129837425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical Analysis of Selenium and Cypress as Functional Automation Framework for Modern Web Application Testing","authors":"Fatini Mobaraya, Shahid Ali","doi":"10.5121/csit.2019.91803","DOIUrl":"https://doi.org/10.5121/csit.2019.91803","url":null,"abstract":"Nowadays text-based password has been widely used in our daily life. However, rather than choose a complex text password people prefer to use a brief password so that they can remember it easily. Moreover, with the rapid increasing use of mobile applications, people often input passwords in public. Attacker can perform shoulder surfing attack to observe the password directly with naked eyes or some video record devices. In order to resist the shoulder surfing attack, a number of authentication schemes based on graph have been proposed. However, graph-based password is totally different from text-based password. It's difficult for users to memorize two different kinds of passwords. In this paper, we propose a mixed login scheme called MixedKey which mixes graphic and traditional textual password. The login indicator in the scheme is randomly and safely generated for each login. MixedKey divides each password into characters, which connects graphic and text-based password. Users could login our system in both public and private situations with just one password. We also implemented MixedKey and conducted experiments to measure the memorability and usability. The results show MixedKey outperforms the existing schemes.","PeriodicalId":423710,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127575180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Random Forest Pruning Techniques","authors":"Minu Rose, H. R. Hassen","doi":"10.5121/csit.2019.91808","DOIUrl":"https://doi.org/10.5121/csit.2019.91808","url":null,"abstract":"Random Forest is an ensemble machine learning method developed by Leo Breiman in 2001. Since then, it has been considered the state-of-the-art solution in machine learning applications. Compared to the other ensemble methods, random forests exhibit superior predictive performance. However, empirical and statistical studies prove that the random forest algorithm generates unnecessarily large number of base decision trees. This may cost high computational efficiency, predictive time, and occasional decrease in effectiveness. In this paper, Authors survey existing random forest pruning techniques and compare the performance between them. The research revolves around both the static and dynamic pruning technique and analyses the scope of improving the performance of random forest by techniques including generating diverse and accurate decision trees, selecting high performance subset of decision trees, genetic algorithms and other state of art methods, among others","PeriodicalId":423710,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Classification Techniques for Wall Following Robot Navigation and Improvements to the KNN Algorithm","authors":"S. Madi, Riadh Baba-Ali","doi":"10.5121/csit.2019.91806","DOIUrl":"https://doi.org/10.5121/csit.2019.91806","url":null,"abstract":"Endoscopic color imaging technology has been a great improvement to assist clinicians in making better decisions since the initial introduction. In this study, a novel combined method, including quadratic objective functions for the dichromatic model by Krebs et al. and Wyszecki`s spectral decomposition theory and the well-known principal component analysis technique is employed. New algorithm method working for color space converting of a conventional endoscopic color image, as a target image, with a Narrow Band Image (NBI), as a source image.\u0000\u0000The images of the target and the source are captured under known illuminant/sensor/filters combinations, and matrix Q of the decomposition theory is computed for such combinations. The intrinsic images which are extracted from the Krebs technique are multiplied by the matrix Q to obtain their corresponding fundamental stimuli. Subsequently, the principal component analysis technique was applied to the obtained fundamental stimuli in order to prepare the eigenvectors of the target and the source. Finally, the first three eigenvectors of each matrix were then considered as the converting mapping matrix. The results precisely seem that the color gamut of the converted target image gets closer to the NBI image color gamut.","PeriodicalId":423710,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}