2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)最新文献

筛选
英文 中文
A low-cost fuel selling machines using RFID and IoT technology 使用RFID和物联网技术的低成本燃料销售机器
Hamid Mohammed Almaden, A. F. Samaha Mansoor, Al-Hassan Al-Faith Al-Hassan, Gamer Al-TayebAhmad, A. K. Ali, Mysoon Siding Ali
{"title":"A low-cost fuel selling machines using RFID and IoT technology","authors":"Hamid Mohammed Almaden, A. F. Samaha Mansoor, Al-Hassan Al-Faith Al-Hassan, Gamer Al-TayebAhmad, A. K. Ali, Mysoon Siding Ali","doi":"10.1109/ICCCEEE.2018.8515783","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515783","url":null,"abstract":"Technological development is growing rapidly worldwide, so many machines, factories, and even homes use these technologies.The target of this paper is to avoid Cars congestion and long waiting in the queue of fuel pumps, excessive employment. The commission is not available financially. And lack of reliability in the sales system. The automatic implementation of the technological systems is very useful for the security and confidentiality of the mechanisms andfactories in particular with respect to access to devices and the user authorized to carry outspecific operations. In this work, an automatic fuel selling machine system is designed using the Radio Frequency Identification RFID device and The Internet of Things technology. The designed system is providing fast filling of fuel, ease in financial transactions, and more secure by checking the rights of access to the device using the RFID card read bythe reader. In addition, the system allows the possibility of monitoring the access to the fuel station and offer a special graphical user interface to the service provider.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73702779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Change Request: A Road Map for Implementation 软件变更请求:实现的路线图
A. Hamid
{"title":"Software Change Request: A Road Map for Implementation","authors":"A. Hamid","doi":"10.1109/iccceee.2018.8515787","DOIUrl":"https://doi.org/10.1109/iccceee.2018.8515787","url":null,"abstract":"Most of software development time is consumed in software evolution and maintenance so as to respond to the growing business needs and to fix the newly discovered bugs. In this paper an approach for software change request implementation is examined. Then a road map is developed to accelerate planning, analysis and decision making process a matter that reduces the implementation effort in terms of time and quality.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"76 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76443043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power-law Degree Distribution Consistency in the AS-level Internet Topology as级Internet拓扑的幂律度分布一致性
Lubna Basheir
{"title":"Power-law Degree Distribution Consistency in the AS-level Internet Topology","authors":"Lubna Basheir","doi":"10.1109/ICCCEEE.2018.8515834","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515834","url":null,"abstract":"This paper reports the finding that power-law degree distributions are consistent in the AS-level Internet topology throughout its lifetime, mainly after Internet commercialization. This result is based on analyzing topology data collected by CAIDA from 2000 to 2017. Power-law degree distribution is an indicator of asymmetry between ASs in acquiring links. The continued presence of this asymmetry is graphically and quantitatively characterized using Lorenz curve and Gini coefficient. Results show that Gini coefficient has not changed significantly through Internet development, recording high values ranging between 0.80 and 0.84. The study concludes that degree distribution asymmetry is a persistent quality of the evolving AS-level Internet topology, making the Internet hierarchical structure inherent.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"42 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78165234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Whole-Body Bone Scan Image Enhancement Algorithms 全身骨扫描图像增强算法
S. M. S. Zobly, M. A. El-Fadel
{"title":"Whole-Body Bone Scan Image Enhancement Algorithms","authors":"S. M. S. Zobly, M. A. El-Fadel","doi":"10.1109/ICCCEEE.2018.8515836","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515836","url":null,"abstract":"The main problem in nuclear medicine imaging system is the resulting images degraded with large amounts of noise. In this work we want use four different enhancement methods to enhance whole-body bone scan image so as to reduce the noise from the image and improve the resolution to achieve a better image quality and maintain quality for accurate diagnosis. Different enhancement methods and two pair bone scan images used to perform this work. The enhancement algorithms are successfully demonstrated on real bone scan images.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"107 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77626689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Six Sigma Methodology in Software Development 六西格玛方法论在软件开发中的应用
A. Hamid
{"title":"Application of Six Sigma Methodology in Software Development","authors":"A. Hamid","doi":"10.1109/ICCCEEE.2018.8515773","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515773","url":null,"abstract":"Six Sigma is a problem solving methodology supported by set of techniques intended to improve business processes by reducing the probability of defect occurrence. The name Six Sigma is originated from the statistical term standard deviation (Greek letter sigma); this statistical term measures the variations in data. The first use of Six Sigma methodology targeted driving the processes toward six standard deviations between the mean and the nearest specification limit; this was the root for the name Six. This paper studies the application of Six Sigma methodology in software development since this methodology is proven in manufacturing as a method of eliminating defects in final products and reducing their variations.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81739430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Effect of the Initial Retransmission Timeout upon the Dictionary Attack Delay 初始重传超时对字典攻击延迟的影响
Ayman Mohammed Muzzamail Albashear, H. Ali
{"title":"The Effect of the Initial Retransmission Timeout upon the Dictionary Attack Delay","authors":"Ayman Mohammed Muzzamail Albashear, H. Ali","doi":"10.1109/ICCCEEE.2018.8515765","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515765","url":null,"abstract":"this paper focuses on the effects of the TCP Initial Retransmission Timeout (RTO) and Round Trip Time (RTT) on one hand and the dictionary attack on the other hand. A dictionary attack model of two servers has been programmed and applied using TCL language. The delay time to find the correct password in the dictionary has been assigned to NS2 simulation network. The value of the initial RTO has been set to 0.5, 1, 3, 5, 10 seconds, with Round Trip Times (RTT) of 1, 5, 10, 20, and 50 milliseconds in the simulated network to study different situations. The results obtained were found to be consistent with previous findings associated to initial RTO values between 0.5s to Is for network performance. The additional values introduced here are for network security purposes as they represent the best values for which the attacker finds difficulty to accomplish dictionary attack.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"86 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Satellite Orbit Determination and Tracking Model Using Two-Line Elements Set 基于双线元集的卫星定轨与跟踪模型
Ahmed Abdelkarim Yassin Abdelkarim, Mahmoud Esawi Babikir Osman, S. Babiker
{"title":"Satellite Orbit Determination and Tracking Model Using Two-Line Elements Set","authors":"Ahmed Abdelkarim Yassin Abdelkarim, Mahmoud Esawi Babikir Osman, S. Babiker","doi":"10.1109/ICCCEEE.2018.8515784","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515784","url":null,"abstract":"Satellites play great role in our life; they are used to perform many tasks that couldn’t be achieved without them. When the satellite launch to its orbit and in order to achieve its mission, the satellite needs to communicate with the ground station to receive the commands and instructions and also send its information to the ground station, but the ground station can’t communicate with the satellite directly before precisely determine its location. Hence, the objective of this research is to design and implement satellite tracking model to determine and track precisely the position of the satellite in its orbit in order to allow the ground station to communicate directly with it using the Two Line Elements Set which are unique for each satellite and need to be accurately specified. This tracking model was designed and developed in three phases: inputs phase, prediction phase and outputs phase. It include graphical user interface that shows illustration of satellite position in its orbit and also shows the value of all necessary data that are required to track the satellite and to predict its motion track.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"116 2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76862624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of an Automated Fertigation System Using IoT 基于物联网的自动化施肥系统设计
Omer Mohamed Elhassan Ahmed, Abdalla A. Osman, Sally Dafaalla Awadalkarim
{"title":"A Design of an Automated Fertigation System Using IoT","authors":"Omer Mohamed Elhassan Ahmed, Abdalla A. Osman, Sally Dafaalla Awadalkarim","doi":"10.1109/ICCCEEE.2018.8515772","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515772","url":null,"abstract":"In Sudan, unfortunately, farmers still use traditional methods of farming management leading to inputs wastages and low production due inaccurate types and amount of fertilizers applied to the field which depends upon soil analysis and plant yield. And the process of determining the type of fertilizers according to the soil analysis results takes a long time. The main objective of this paper is to overcome the above-mentioned problems by designing an automated fertigation system based on the internet of things (IoT). Water use efficiency (WUE) is achieved and controlled by using moisture sensor when the soil moisture drops below 30% is opened and closes when it reaches 70% (preset data according to plant needs). The fertilization control is the process of adjusting the potential of Hydrogen (pH) and soil electrical conductivity (EC) as in preset database and thereby acidity and alkalinity. In addition to that, the plant root zone is controlled as required. When the system is applied, it improves water and fertilizer use efficiencies and thus saves effort, money, time, energy, increases production, and productivity.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"76 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77187701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Enhancement of Data Encryption Standards Algorithm (DES) 数据加密标准算法(DES)的改进
Nadia Mustafa Mohammed Alhag, Y. Mohamed
{"title":"An Enhancement of Data Encryption Standards Algorithm (DES)","authors":"Nadia Mustafa Mohammed Alhag, Y. Mohamed","doi":"10.1109/ICCCEEE.2018.8515843","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515843","url":null,"abstract":"The Data Encryption Standard (DES) algorithm has been considered as the most popular symmetric key, blocks ciphering cryptographic. Even though the DES algorithm had still been used in some applications, it was considered unsafe because of the short key length (64 Bits), besides, the Brute force attack has shown that the DES practically can be attacked. In January 1999, the DES key was cracked in only (22 hours) and (15 minutes). The aim of this research is to improve the DES algorithm by increasing the key length (1024 bits) that is to be divided into 16 keys (64 bits each), each key is independently generated for the different algorithm cycles. The results of the proposed algorithm were much better than the old algorithm for detecting the encryption key or the total number of keys that could be generated by following Blind search method (try all possible keys), Increasing the key length (degree of complexity) makes it difficult to search in a vast space of numbers and attempts.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78454767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing The Accuracy of GPS Point Positioning by Modeling the Ionospheric Propagation Delay 利用电离层传播延迟模型提高GPS点定位精度
Abubakr Albashir, Kamal Abdellatif Sami, Mohammed Ahmedeltigani
{"title":"Enhancing The Accuracy of GPS Point Positioning by Modeling the Ionospheric Propagation Delay","authors":"Abubakr Albashir, Kamal Abdellatif Sami, Mohammed Ahmedeltigani","doi":"10.1109/ICCCEEE.2018.8515792","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515792","url":null,"abstract":"The ionospheric propagation delay is one of the major error sources in GPS positioning. This effect is as a result of the fact that the GPS signals are affected by the ionized layer of the ionosphere. Subsequently, the signal reception time will be delayed, which causes an increase in the measured pseudo-ranges and phase measurements of GPS observables.In this paper the linear combination observables technique was used to estimate the ionospheric propagation delay effect on the measured pseudo-ranges and GPS point positioning. The use of the free linear combination technique was found to reduce the ionospheric propagation effects significantly.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"340 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77664891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信