2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)最新文献

筛选
英文 中文
Reactive Power Locational Marginal Pricing 无功发电区位边际定价
M. Dahab
{"title":"Reactive Power Locational Marginal Pricing","authors":"M. Dahab","doi":"10.1109/ICCCEEE.2018.8515804","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515804","url":null,"abstract":"A proposed mathematical model for calculating the locational marginal pricing (LMP) of reactive power at the load buses was developed and tested on an IEEE 30 bus test system with the framework of the full AC optimal power flow (OPF). The trust region incremental linear programming method was utilized to solve the OPF problem. The power factor pricing approach based on the generator capability curve was used to develop the reactive power cost function. Considering the existence of fixed shunt capacitor banks on the network, the proposed formulation was tested and provided an accurate result.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"25 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76729379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Analysis of OWMR Directional Wheels Robot Arm based on (ANFIS+PID) controller 基于(ANFIS+PID)控制器的OWMR定向轮式机械臂性能分析
Zeinab mahmoud Omer, Osman Ibrahim Al-Agha, Aatif osman altahir bakr, K. Bilal
{"title":"Performance Analysis of OWMR Directional Wheels Robot Arm based on (ANFIS+PID) controller","authors":"Zeinab mahmoud Omer, Osman Ibrahim Al-Agha, Aatif osman altahir bakr, K. Bilal","doi":"10.1109/ICCCEEE.2018.8515874","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515874","url":null,"abstract":"The main objective of this study is to design an Adaptive Neuro Fuzzy Inference System (ANFIS) algorithm to solve the problem of finding the inverse kinematics to control the movement of the modified PUMA 560 arm in robotic system.Accuracy and stability are two major issues that face designers when control system design is intended. Tuning the system to coup with the variations and changes in the environment where the system is expected to work. In this paper the mechanical design of modified PUMA 560 robotic arm with 6 DoF was revisited and implemented with new powerful features and the experimental results were tracked. The main problem is the dynamic equations which are nonlinear and time-varying in the extreme. The challenge was how to manipulate these equations in such a way leading to a better performance regarding accuracy and stability of the system. The method used to control the base of robot arm which consists of 3-wheels with 120 degrees apart was designed and implemented. After that accurate trajectory control methods which use Adaptive Neuro Fuzzy Inference System of 3-wheels omni-directional mobile robot were implemented. Thus the design of full new robot system structure was used in the validation and testing the performance of proposed methods. This included modification of the PUMA 560 arm by the addition of an omini-directinal wheeled mobile robot (OWMR) base structure to the robotic arm. This base consisted of three motors for 3-wheels which are positioned 120 degrees apart. The resulting robot was a modified PUMA 560 robotic arm with 6 axes. The results obtained showed a significant improvement in both accuracy and stability of the system proposed. Hence, objectives were met to a great extent.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77110391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Cognitive Radio Technology in WCDMA System 认知无线电技术在WCDMA系统中的实现
M. M. Ahmed, A. Mohamed, K. Bilal, Zeinab mahmoud Omer
{"title":"Implementation of Cognitive Radio Technology in WCDMA System","authors":"M. M. Ahmed, A. Mohamed, K. Bilal, Zeinab mahmoud Omer","doi":"10.1109/ICCCEEE.2018.8515883","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515883","url":null,"abstract":"Cognitive radio technology provides high bandwidth to mobile users through exploiting the spectrum effectively by allowing unlicensed users to use wireless architectures for license user In addition to use dynamic spectrum access techniques. Also, there are many challenges facing the cognitive radio technology such as the quality of service for the unlicensed user, changes in the surrounding environment and mobility from frequency to frequency with the requirement not to lose connection. However, cognitive radio technology remains promising and will change the concept of communications very much. In this paper, cognitive radio was applied in the WCDMA system to allow the new user to exploit the licensed spectrum without interference between them, depending on the energy detection technique to detect holes in Spectrum licensed. The performance of secondary users in WCDMA system was evaluated using the MATLAB simulation program and compared with theoretical BER of narrowband BPSK then obtained results in form of tables and error rate curves against signal to noise ratio.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"16 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80931261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Distributed Energy Efftcient Clustering Scheme for Heterogeneous WSNs 异构无线传感器网络优化的分布式能效聚类方案
SalahAddin A. Almogahed, I. Abuel Maaly
{"title":"Optimized Distributed Energy Efftcient Clustering Scheme for Heterogeneous WSNs","authors":"SalahAddin A. Almogahed, I. Abuel Maaly","doi":"10.1109/ICCCEEE.2018.8515864","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515864","url":null,"abstract":"Wireless Sensor Networks (WSNs) have become one of the most motivating research areas. In this paper we have proposed an Optimized Distributed Energy Efficient Clustering scheme for Heterogeneous WSNs (ODEEC) to prolong the network lifetime and stability period. This protocol proposes an optimization of the Cluster Head (CH) selection by modifying the probability function of heterogeneity. The network field is classified into two parts inner region and outer region. The sensor nodes decide to become cluster head nodes or not based on their positions from Base Station (BS) as well as the probabilities of heterogeneity model. Simulation results show that ODEEC achieves better performance among the relevant protocols in terms of throughput as well as network lifetime and stability period.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87416101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Algorithms Replication Using Grid Computing 使用网格计算的动态算法复制
Khadiga Omer, G. Abdalla
{"title":"Dynamic Algorithms Replication Using Grid Computing","authors":"Khadiga Omer, G. Abdalla","doi":"10.1109/ICCCEEE.2018.8515859","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515859","url":null,"abstract":"Data grid is one of the most popular grid computing implementations concerning data management system and data replication technologies. The aim of data replication is to increase availability, fault tolerance, load balancing and scalability while reducing bandwidth consumption, and job execution time. In this paper we investigate Data grid as a solution for the internal network traffic bottleneck at the University of Khartoum due to high numbers of users by replicating the internal systems of the University closer to the users. OptorSim Grid simulator was used to study the behavior of the various dynamic replication algorithms and to evaluate their performance metrics. The results showed that the predictive algorithms are the most effective at optimizing computing and storage resources and they offer the best effective network usage. Other metrics such as the thread numbers at each computing element and the bandwidth range to particular site in comparison to the number of executed jobs were also evaluated. It was found that the thread number was inversely related to the mean job time while the link bandwidth of a particular site was proportionally related to the number of jobs been executed on that site.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85957215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modelling of Sudan’s Economy Composition using Machine Leaming Approaches 利用机器学习方法建立苏丹经济结构模型
Gaafar E. G. Mustafa, Y. Y. Ahmed, M. Nawari
{"title":"Modelling of Sudan’s Economy Composition using Machine Leaming Approaches","authors":"Gaafar E. G. Mustafa, Y. Y. Ahmed, M. Nawari","doi":"10.1109/ICCCEEE.2018.8515868","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515868","url":null,"abstract":"Modelling of economy systems is critical as it provides means of addressing and future forecasting of economic outcomes, hence accurate models should be developed. The purpose of this research is to show the effectiveness of Machine Learning approaches in modelling of economy systems. The economy of Sudan is used to reflect this objective, taking the Gross Domestic Product (GDP) as a monetary measure of economy. It was found that Agriculture, Industry and Service are the main contributors of Sudan’s GDP in accordance to the GDP data of Sudan from 1960 to 2016. In this research, Regression and Support Vector Machine algorithms were used to develop two different models of Sudan’s economy. Both models have produced satisfying results in predicting, however the SVM model has out-performed the Polynomial Regression model.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89751699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Violation in DiffServ Priority 检测DiffServ优先级违规
Ahmed A. Ghanem, K. Bilal
{"title":"Detecting Violation in DiffServ Priority","authors":"Ahmed A. Ghanem, K. Bilal","doi":"10.1109/ICCCEEE.2018.8515848","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515848","url":null,"abstract":"Due to of the fast growth in network technology structure and spread uses in all our life, in the same time the networks threated are rapidly increased. This paper presents an edge to edge model. The aim is to detect intrusion in the networks with little effort on the network resources. by monitoring and detecting the Denial of Service / Distributed Denial of Service (DoS/DDoS) attacks in case of network congestion and their impact on priority level of users. Hybrid threshold used to know if users are violating the network services or not. Random Early Detection (RED) threshold is an adaptive threshold moves between minimum and maximum values, Service Level Agreement (SLA) threshold is a predefined values determined between customer and service provider (SP). RED algorithm used in Quality of Service (QoS) DiffServ environment to monitor the network, when notice the suspicious users exceed the Hybrid threshold, the Detecting Violation in DiffServ Priority (DVDP) model moves to other phase and computes the throughput for suspicious users. This model used Network Simulator 2 (NS2) to simulate the proposed network, this network has users with low level priority triggered a lot of traffic and effected on the high level priority users and consume their bandwidth. This model detect the malicious users affected on the users have high priority, and differentiate with legal users. The accuracy on detected the malicious users estimates about 94%, and a very high sensitivity to the abnormal traffic.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89111595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key-dependent Advanced Encryption Standard 依赖密钥的高级加密标准
Abdelrahman Altigani, S. Hasan, Bazara I. A. Barry, S. Shamsuddin
{"title":"Key-dependent Advanced Encryption Standard","authors":"Abdelrahman Altigani, S. Hasan, Bazara I. A. Barry, S. Shamsuddin","doi":"10.1109/ICCCEEE.2018.8515761","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515761","url":null,"abstract":"Rijndael has been selected by the National Institute for Standards and Technology (NIST) as the Advanced Encryption Standard (AES). In compliance with Kerckhoffs's principle, and to preserve and promote interoperability, the design and internal operation of AES must remain open. However, we suggest that there is no need to retain the static nature of the design. Consequently, this research paper main objective is to introduce a dynamic algorithm, that determines the exact steps used for encrypting or decrypting payloads during execution time. This has been achieved by making AES parameters key dependent, rather than reuse fixed, pre-determined values.The result is an armored version of the AES that changes its internal design with almost every new encryption key. The proposed design is provided and analyzed in terms of security, implementation cost and possibility for further improvements.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"12 5","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91421086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Enhancement of Atbara-Portsudan Radial Transmission Line Using NEPLAN Simulator 利用NEPLAN模拟器增强Atbara-Portsudan径向传输线的性能
G. Kalcon, Mazen Khaled
{"title":"Performance Enhancement of Atbara-Portsudan Radial Transmission Line Using NEPLAN Simulator","authors":"G. Kalcon, Mazen Khaled","doi":"10.1109/ICCCEEE.2018.8515797","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515797","url":null,"abstract":"Due to the ever increasing demand of power, economic and environmental constraints that limit the expansion and restructuring transmission networks, the transmission lines are prone to be operated under heavily stress conditions, and power systems to operate near critical limits. This paper investigates the problem and different scenarios to improve the power transfer capability of Atbara-Portsudan single circuit 220kV radial transmission line as one of the Sudan Grid problems. This line was selected depending on line indices such as Fast Voltage Stability Index (FVSI), Line Stability Index (Lmn), U-Q sensitivities. Simulation was carried out using NEPLAN software, based on real data given from National Load Dispatch Center (NLDC) in Sudan. All the results presented in comparison form to find the best scenario.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91546228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single Screw Extruder Design Calculations using MatLab and Visual Basic 用MatLab和Visual Basic进行单螺杆挤出机的设计计算
S. M. Ibrahim, Magdi A. O. Mohammed, Y. E. Ahmed
{"title":"Single Screw Extruder Design Calculations using MatLab and Visual Basic","authors":"S. M. Ibrahim, Magdi A. O. Mohammed, Y. E. Ahmed","doi":"10.1109/ICCCEEE.2018.8515793","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515793","url":null,"abstract":"Computer and its applications have entered various fields of applied sciences and engineering, for instance, Computer Aided Design (CAD) is being efficiently used for devices and equipment design, reducing the design calculations complexity in reliable manner. Regarding to food engineering, which deals with devices, equipment and food substances together, it uses in order to facilitate and accelerate the process of conducting engineering calculations. This study aimed to use specific computer programs, namely MatLab and Visual Basic, to develop a software system to audit the complex design calculations of single screw extruder. Extrusion is defined simply as the act of forcing something through an orifice, it is finding ever-increasing application in the food industry, such as the production of ready-to-eat cereals, pasta, snacks, pet food, fish foods, and confectionary products, apart from its obvious applications in the plastics industry. The results of this study might be later used in unit operation laboratories, or in food processing equipment manufacturing plants in general. For this purpose, using engineering equations of this extruder, the necessary algorithm was created and then the codes were written for each program. After that, interfaces were opened, and then they were supplied with all necessary components to perform calculations as required. To verify and estimate the proposed system, the traditional manual calculation methods were used to obtain reliable results first, and then MATLAB and Visual Basic programs were used to generate these calculations. The experimental results have expressed that the required engineering computational results, that required to design of single screw extruder, according to the input data were found. A comparison study was carried out between the results obtained traditionally and those obtained using the MATLAB and Visual Basic programs; also engineering calculations for other extruders were performed with different data in the same manner. It was found that the accuracy and speedily results of these operations were confirmed.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"57 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90998925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信