2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)最新文献

筛选
英文 中文
Performance Evaluation of MIMO FSO Communication with Gamma-Gamma Turbulence Channel using Diversity Techniques 基于分集技术的伽马湍流信道MIMO FSO通信性能评估
R. Saeed, Esra B. Abbas
{"title":"Performance Evaluation of MIMO FSO Communication with Gamma-Gamma Turbulence Channel using Diversity Techniques","authors":"R. Saeed, Esra B. Abbas","doi":"10.1109/ICCCEEE.2018.8515825","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515825","url":null,"abstract":"recently, Free Space Optical (FSO) communication has been evaluated in indoor and outdoor experimental environments for other communication applications, which opens the study of environmental effects in FSO communications, these effects represents the nature environments around us such as rain and fog, which are termed by mathematical distribution models such as Iognormal and Gamma-gamma distribution. One of the major solutions that proposed to reduce these effects and enhance the received signal is the use of Multiple Input Multiple Output MIMO diversity techniques in FSO which is also considered in this study in addition to Gamma-Gamma turbulence channel. In this paper, a simulation based study is performed to evaluate Free Space Optics Communication FSOC which represents the latest technologies that implies the highest data rate links which is been used in more sensitive communication fields such as satellite communications. The results obtained from Matlab modeling. Simulations showed that better received signal can be achieved.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"49 16 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76372802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case 利用TCP重传超时检测中间人攻击——以密钥泄露冒充攻击为例
Ayman Mohammed Muzzamail Albashear, H. Ali, Abeer M. Ali
{"title":"Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case","authors":"Ayman Mohammed Muzzamail Albashear, H. Ali, Abeer M. Ali","doi":"10.1109/ICCCEEE.2018.8515845","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515845","url":null,"abstract":"A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired then the sender will assume that this segment has been lost. This paper proposed another use of the RTO concept in order to secure the TLS session. It calculates a Secure Session RTO or SSRTO which is based on RTO equation between the sender and receiver in a TLS protocol. It is assumed that the man in the middle is in need of the time factor in order to trigger a KCI attack. at the server side, by calculating the time needed to start a TLS Handshake Protocol, until TLS Record Protocol, and if it is found that it took an appreciable time we may assume that there is an attacker. The action in this case, is to cut off the session between the sender and the receiver.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"8 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88611073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical Model Implementation of Vertical Handover Network Decision Algorithms in Heterogeneous Network Based On QoS Parameters 基于QoS参数的异构网络垂直切换网络决策算法的数学模型实现
Aridegbe. A. A. Ipaye, Ali. M. A. Ibrahim, I. Ahmed, Sami A. Nagar, Dimitrios. N. G. Mitropoulos
{"title":"Mathematical Model Implementation of Vertical Handover Network Decision Algorithms in Heterogeneous Network Based On QoS Parameters","authors":"Aridegbe. A. A. Ipaye, Ali. M. A. Ibrahim, I. Ahmed, Sami A. Nagar, Dimitrios. N. G. Mitropoulos","doi":"10.1109/ICCCEEE.2018.8515776","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515776","url":null,"abstract":"Due to the demanding requirements of the next generation technology, there is a need for heterogeneous wireless networks. One of the most crucial issues in heterogeneous network is vertical handover and many algorithms have been introduced in order to make the vertical handover performance more accurate. In this paper, three scenarios based on MADM algorithms (WSM, WPM and TOPSIS) and their corresponding modified versions with respect to QoS parameter (delay, bandwidth, cost, and jitter) are compared and analyzed in order to determine their performance. The results show that the modified WPM consistently selected the third network, which indicates that any variations in the parameters will not affect the algorithm performance.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83544484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Brain Tumor Detection by using Artificial Neural Network 基于人工神经网络的脑肿瘤检测
Hussna Elnoor Mohammed Abdalla, M. Esmail
{"title":"Brain Tumor Detection by using Artificial Neural Network","authors":"Hussna Elnoor Mohammed Abdalla, M. Esmail","doi":"10.1109/ICCCEEE.2018.8515763","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515763","url":null,"abstract":"Brain tumor is one of the most dangerous diseases which require early and accurately detection methods, now most detection and diagnosis methods depend on decision of neurospecialists, and radiologist for image evaluation which possible to human errors and time consuming. This study reviews and describe the processes and techniques used in detection brain tumor based on magnetic resonance imaging (MRI) and artificial neural networks (ANN) techniques, Which executed in the different steps of Computer Aided Detection System (CAD) after collected the image data (MRI); first stage is pre-processing and post-processing of MRI images to enhancement it and make it more suitable to analysis then used threshold to segment the MRI images by applied mean gray level method. In the second stage was used the statistical feature analysis to extract features from images; the features computed from equations of Haralick’s features based on the spatial gray level dependency matrix (SGLD) of images. Then selected the suitable and best features to detect the tumor localization. In the third stage the artificial neural networks were designed; the feedforward back propagation neural network with supervised learning were apply as automatic method to classify the images under investigation into tumor or none tumor. the network performances was evaluated successfully tested and achieved the best results with accuracy of 99%, and sensitivity 97.9%.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78762521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Geothermal Mainstream Adoption through Risk Mitigation in Sudan 在苏丹通过减轻风险采用地热主流
Ashraf M. A Khadam, K. Ramadan, E. Hamouda
{"title":"Geothermal Mainstream Adoption through Risk Mitigation in Sudan","authors":"Ashraf M. A Khadam, K. Ramadan, E. Hamouda","doi":"10.1109/ICCCEEE.2018.8515898","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515898","url":null,"abstract":"The purpose of this paper is to assess the main schemes to be utilized in East African countries based on evidence obtained in many countries to directly address geothermal resource risk, and to show the major incentives to be applied in this sector to mobilize and attract the necessary investment for geothermal development. Some successful experiences in East African region will be discussed and analyzed. Also this paper introduces the geothermal potential in Sudan and set a road map towards much engagement of geothermal polices adoption. This paper points out the potential contribution of oil operating companies to support geothermal development. An example of data collected from oil well in a certain location in Sudan has been analyzed by using statistical software called Minitab. The findings of this analysis gave useful results to be mainstreamed to different locations.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"17 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78900370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Convolutional Neural Networks for Brain Tumor Segmentation in MRI Images 优化卷积神经网络对MRI图像中脑肿瘤的分割
Mohamed Ali, R. Hamad, Mohanned Ahmed
{"title":"Optimizing Convolutional Neural Networks for Brain Tumor Segmentation in MRI Images","authors":"Mohamed Ali, R. Hamad, Mohanned Ahmed","doi":"10.1109/ICCCEEE.2018.8515826","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515826","url":null,"abstract":"Gliomas comprise about 80% of all malignant brain tumors and have the lowest survival rate of all brain tumors. Segmentation of tumors is an important step in evaluating the tumor, preparing the treatment plan and estimating the patient survival period. Tumor tissues have a distinguishable appearance in MRI images so they are widely used for brain tumor segmentation. Many solutions were proposed to automate brain tumor segmentation but convolutional neural networks (CNNs) have the most promising results. Tens of neural networks were proposed for tumor segmentation but they still did not achieve good enough accuracies to be deployed in real-world applications. In this paper, we focused on optimizing patch-wise classifier CNN and the results obtained are discussed to show the effect of some design decision taken. We evaluated the segmentation results using the Dice Similarity Coefficient (DSC). The results of this paper can be used to improve existing models or as a guideline for developing new CNN models. Finally, we point out possible future directions for research.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76675046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Late Acceptance Selection Hyper-heuristic for Wind Farm Layout Optimisation Problem 风电场布局优化问题的后期验收选择超启发式算法
Hiba Abdulaziz, A. Elnahas, Alaa Daffalla, Yossra Noureldien, A. Kheiri, E. Özcan
{"title":"Late Acceptance Selection Hyper-heuristic for Wind Farm Layout Optimisation Problem","authors":"Hiba Abdulaziz, A. Elnahas, Alaa Daffalla, Yossra Noureldien, A. Kheiri, E. Özcan","doi":"10.1109/ICCCEEE.2018.8515808","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515808","url":null,"abstract":"Wind is a promising source of renewable energy which can be harvested using wind turbines placed on farms. An efficient wind farm layout achieving various engineering and financial objectives is crucial to ensure the sustainability and continuity of energy production. In this study, a high-level search technique, namely late acceptance selection hyper-heuristic is applied to optimise the layout of wind farms. This approach aims to find the best placement of turbines at a given site, maximising the energy output while minimising the cost at the same time. The computational experiments indicate that the late acceptance selection hyper-heuristic improves upon the performance of a previously proposed genetic algorithm across all scenarios and an iterated local search over the majority of scenarios considering the best solutions obtained by each algorithm over the runs.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"235 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77343428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy Efficient Mobility Management Mechanism in Software Defined Networking (SDN) 软件定义网络(SDN)中节能的移动性管理机制
N. S. Shahrun, A. F. Y. Mohammed, Rudy Ramlie, S. Newaz, A. T. Wan
{"title":"An Energy Efficient Mobility Management Mechanism in Software Defined Networking (SDN)","authors":"N. S. Shahrun, A. F. Y. Mohammed, Rudy Ramlie, S. Newaz, A. T. Wan","doi":"10.1109/ICCCEEE.2018.8515818","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515818","url":null,"abstract":"Software Delined Networking (SDN) has paved the way for cost effective, energy efficient, and flexible and dynamic network structure. In SDN, a controller sets routing path for the data plane consisting of several switches. If an incoming packet is not known to a switch, the switch needs to invoke the controller, in turn the controller facilitates forwarding path for that packet. In case when a station is mobile (e.g., mobile phone or laptop), the controller needs to update the SDN forwarding path whenever the Mobile Terminal (MT) gets attached with a new switch. This will result in increasing location update overhead at not only the controller but also all the intermediate switches between the main controller and Leaf Switch (LS). Some of the existing research efforts consider both SDN forwarding path update and Layer 3 location update whenever a MT attaches with a new LS. In our study, we have realized that if mobile IP over SDN is managed, a network operator will end up imposing additional location update cost. In this paper, a novel overlay SDN topology is proposed in order to manage location update of MTs. In this contribution, a MT maintains its location update with a Root Switch (RS), which is in charge of tracking location of MTs within a cluster of cells, as long as the MT stays within the cluster (regional area). However, if the MT moves out of the regional area, in our proposal, there will be a location update at the main controller. Results obtained through numerical analysis reveal that proposed overlay topology based location update mechanism in SDN can lead to reduced location update cost noticeably.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"80 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85835740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Efficient Cyclic Redundancy Check-32 using FPGA 基于FPGA的高效循环冗余校验32设计
Mohamed Abdulnabi, Hisham Ahmed
{"title":"Design of Efficient Cyclic Redundancy Check-32 using FPGA","authors":"Mohamed Abdulnabi, Hisham Ahmed","doi":"10.1109/ICCCEEE.2018.8515877","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515877","url":null,"abstract":"In Data Integrity, Cyclic Redundancy Check (CRC) is error detection technique. CRC treat a group of binary bits of a message by dividing it by a fixed binary number, the resulted remainder is the checksum that will be attached to the message. On the receiver side the same division could be performed and the receiver can compare the remainder with the transmitted checksum. This paper explains the design of CRC32 that used in Ethernet using Field Programmable Gate Array (FPGA) Virtex-7. The design built based on lookup tables and slicing-by-16 algorithm that performed the calculations of the CRC32 in parallel. Xilinx ISE used as IDE and I-Sim used for the simulation. The resulted processing time is equal to 1.250 ns with low power consumption and low device utilization.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"22 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87403735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of Vehicle Tracking System 车辆跟踪系统的设计
E. O. Elamin, Wadah.M. Alawad, Elwasila Yahya, Abdallah Abdeen, Y. M. Alkasim
{"title":"Design of Vehicle Tracking System","authors":"E. O. Elamin, Wadah.M. Alawad, Elwasila Yahya, Abdallah Abdeen, Y. M. Alkasim","doi":"10.1109/ICCCEEE.2018.8515767","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515767","url":null,"abstract":"in this paper, a vehicle tracking system has been person is drunk, after identify them the sensor will stop the car proposed utilizing the Global Position System ’GPS” takes the information work in regular basis via satellite, and the Global System for Mobile communication ’GSM” to send and receive data between the user and the system. The interaction between the user and the car is designed to be via Short Message System “SMS”. As well as in case of theft or scope of work departure, the user has the capability of turning car engine off remotely. Although, alcohol sensor is used to switch off the car in case of drunk driver. To keep save distance in front of the car, ultra-sonic sensor is used. The system has been design using computer software then hardware implemented, results have been obtained which showed accuracy in positioning and fast response to user commands.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"135 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84028263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信