Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068152
Neveen M. Hussein, A. Hesham, Mohsen A. Rashawn
This paper presents Nonintrusive Load Monitoring (NILM) for electrical home appliances network which consists of a known set of devices. Hidden Markov Model (HMM) is used for system modeling. The proposed method enhances determining and defining all states for each device. First we classify each device states into a set of states not only the ON and OFF states in the form of variations in its active power ranges. AMPDS collected dataset is used in training and testing for six selected home devices in a certain household and is also compared to GREEND dataset showing the advantage of the variable observed power readings with those of constant power readings. Each device has different number of states. Then the proposed mechanism is used to minimize these states after understanding the behavior of each state into OFF and ON states only. This method provides high accuracy on the system level, the device level, state inference, power and state sequence estimation.
{"title":"States and Power Consumption Estimation for NILM","authors":"Neveen M. Hussein, A. Hesham, Mohsen A. Rashawn","doi":"10.1109/ICCES48960.2019.9068152","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068152","url":null,"abstract":"This paper presents Nonintrusive Load Monitoring (NILM) for electrical home appliances network which consists of a known set of devices. Hidden Markov Model (HMM) is used for system modeling. The proposed method enhances determining and defining all states for each device. First we classify each device states into a set of states not only the ON and OFF states in the form of variations in its active power ranges. AMPDS collected dataset is used in training and testing for six selected home devices in a certain household and is also compared to GREEND dataset showing the advantage of the variable observed power readings with those of constant power readings. Each device has different number of states. Then the proposed mechanism is used to minimize these states after understanding the behavior of each state into OFF and ON states only. This method provides high accuracy on the system level, the device level, state inference, power and state sequence estimation.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128064807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068160
Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin
In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.
{"title":"An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System","authors":"Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES48960.2019.9068160","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068160","url":null,"abstract":"In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068150
Hatem Fetoh, Ahmad M. Hamad, K. M. Amin
Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.
{"title":"A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer","authors":"Hatem Fetoh, Ahmad M. Hamad, K. M. Amin","doi":"10.1109/ICCES48960.2019.9068150","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068150","url":null,"abstract":"Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068170
Diaa A. Noby, Ahmed K. F. Khattab
This paper presents an extensive study of the different ways the Internet of Things (IoT) applications exploit the recently developed blockchain technology. Even though the blockchain technology was originally presented as a security mechanism, its numerous benefits such as decentralization, immutability, persistence, anonymity and auditability can be used by IoT systems in different ways. More specifically, we classify the ways IoT systems exploit blockchain into three categories: resource management, decentralized information sharing, and IoT security. The comprehensive study of the applications of the blockchain technology in the different IoT domains presented in this paper sheds the light on the future research directions in the integration of the two technologies.
{"title":"A Survey of Blockchain Applications in IoT Systems","authors":"Diaa A. Noby, Ahmed K. F. Khattab","doi":"10.1109/ICCES48960.2019.9068170","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068170","url":null,"abstract":"This paper presents an extensive study of the different ways the Internet of Things (IoT) applications exploit the recently developed blockchain technology. Even though the blockchain technology was originally presented as a security mechanism, its numerous benefits such as decentralization, immutability, persistence, anonymity and auditability can be used by IoT systems in different ways. More specifically, we classify the ways IoT systems exploit blockchain into three categories: resource management, decentralized information sharing, and IoT security. The comprehensive study of the applications of the blockchain technology in the different IoT domains presented in this paper sheds the light on the future research directions in the integration of the two technologies.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068151
Mohamed M. Ahmed, Hassan Bedour, S. M. Hassan
Due to the vast developments in the media communication field and the quality of the visual imaging, image data compression has been one of the most interesting field. The main purpose of the image compression is to produce a very low bit rate while achieving a high quality of the reconstructed images. Image compression are used for all fields of media communication such as medical image recognition, multimedia, digital image processing. There are different algorithms for compression and reconstruction. One of these methods is the Orthogonal Matching Pursuit that is used mainly in the reconstruction of the radar signal. This paper discloses a new methodology for image compression and reconstruction to enhance the performance while at the same time reducing the bit data size. This kind of reconstruction algorithm is based upon multistage compression and OMP reconstruction. The Matlab Simulation and the FPGA implementation will be provided in this paper to validate the concept of this paper.
{"title":"Design and Implementation of a Multistage Image Compression and Reconstruction System Based on the Orthogonal Matching Pursuit Using FPGA","authors":"Mohamed M. Ahmed, Hassan Bedour, S. M. Hassan","doi":"10.1109/ICCES48960.2019.9068151","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068151","url":null,"abstract":"Due to the vast developments in the media communication field and the quality of the visual imaging, image data compression has been one of the most interesting field. The main purpose of the image compression is to produce a very low bit rate while achieving a high quality of the reconstructed images. Image compression are used for all fields of media communication such as medical image recognition, multimedia, digital image processing. There are different algorithms for compression and reconstruction. One of these methods is the Orthogonal Matching Pursuit that is used mainly in the reconstruction of the radar signal. This paper discloses a new methodology for image compression and reconstruction to enhance the performance while at the same time reducing the bit data size. This kind of reconstruction algorithm is based upon multistage compression and OMP reconstruction. The Matlab Simulation and the FPGA implementation will be provided in this paper to validate the concept of this paper.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068132
Fatma Mohamad, Khaled Hosny, T. Barakat
Power transformer is an essential part in any power plant, so continuous check of its reliability should be kept up. Dissolved Gas Analysis (DGA) is one of the most important techniques for detecting incipient faults of transformer that immersed in insulation oil. Some widely used conventional techniques based on DGA such as Roger's and IEC methods were developed to diagnose faults of power transformers. These methods succeeded noticeably to detect transformer's faults. However, they fail to detect the fault type if the measured ratios of gases slightly deviated from the crisp boundaries of ranges assigned by these methods. An Artificial Intelligent technique based method called fuzzy logic approach, which is the field of study in this paper is used to overcome the above mentioned drawback by fuzzifying the boundaries of ranges defined by these techniques. This paper presents a comparison between the results of conventional Roger's, IEC methods and the proposed fuzzy logic.
{"title":"Incipient Fault Detection of Electric Power Transformers Using Fuzzy Logic Based on Roger's and IEC Method","authors":"Fatma Mohamad, Khaled Hosny, T. Barakat","doi":"10.1109/ICCES48960.2019.9068132","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068132","url":null,"abstract":"Power transformer is an essential part in any power plant, so continuous check of its reliability should be kept up. Dissolved Gas Analysis (DGA) is one of the most important techniques for detecting incipient faults of transformer that immersed in insulation oil. Some widely used conventional techniques based on DGA such as Roger's and IEC methods were developed to diagnose faults of power transformers. These methods succeeded noticeably to detect transformer's faults. However, they fail to detect the fault type if the measured ratios of gases slightly deviated from the crisp boundaries of ranges assigned by these methods. An Artificial Intelligent technique based method called fuzzy logic approach, which is the field of study in this paper is used to overcome the above mentioned drawback by fuzzifying the boundaries of ranges defined by these techniques. This paper presents a comparison between the results of conventional Roger's, IEC methods and the proposed fuzzy logic.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/icces48960.2019.9068127
Ashraf Salem, H. Abbas, M. El-Kharashi, Ayman M. Bahaa El-Din, Mohamad Taher
{"title":"Proceedings ICCES 2019 14th International Conference on Computer Engineering and Systems (ICCES)","authors":"Ashraf Salem, H. Abbas, M. El-Kharashi, Ayman M. Bahaa El-Din, Mohamad Taher","doi":"10.1109/icces48960.2019.9068127","DOIUrl":"https://doi.org/10.1109/icces48960.2019.9068127","url":null,"abstract":"","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068125
Ahmed F. AbouElhamayed, Hani M. K. Mahdi, Cherif R. Salama
Solving the traffic congestion problem has many benefits financially and environmentally. The application of Artificial Intelligence to solving the traffic congestion problem has been going on for a while. However, most of the current research in this area depends on knowing lots of information about all vehicles in the network. While it produces promising results, applying these techniques in the current world is not easy. In this paper, we apply reinforcement learning to the field of traffic control under the assumption that only minimal information is available. Our approach produces results that are better than currently deployed fixed-time traffic lights without having heavy requirements. In our first test configuration, our agent's waiting time is 82.3% of the best fixed-time traffic lights' waiting time and the average CO2 emissions produced by our agent is 97.5% of the emissions produced by the best fixed-time traffic lights. This shows the potential of applying reinforcement learning to the traffic control problem with limited state.
{"title":"Low-Cost Traffic Control using Reinforcement Learning","authors":"Ahmed F. AbouElhamayed, Hani M. K. Mahdi, Cherif R. Salama","doi":"10.1109/ICCES48960.2019.9068125","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068125","url":null,"abstract":"Solving the traffic congestion problem has many benefits financially and environmentally. The application of Artificial Intelligence to solving the traffic congestion problem has been going on for a while. However, most of the current research in this area depends on knowing lots of information about all vehicles in the network. While it produces promising results, applying these techniques in the current world is not easy. In this paper, we apply reinforcement learning to the field of traffic control under the assumption that only minimal information is available. Our approach produces results that are better than currently deployed fixed-time traffic lights without having heavy requirements. In our first test configuration, our agent's waiting time is 82.3% of the best fixed-time traffic lights' waiting time and the average CO2 emissions produced by our agent is 97.5% of the emissions produced by the best fixed-time traffic lights. This shows the potential of applying reinforcement learning to the traffic control problem with limited state.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068171
Amr M. Zaki, M. Khalil, Hazem M. Abbas
Abstractive text summarization is the task of generating a novel summary given an article, not by merely extracting and selecting text to produce a summary, but by actually creating and understating the given text to produce a summary. LSTM seq2seq encoder-decoder with attention models have proved successful in this task, but they suffer from some problems. In this work, we would go through multiple models to try and solve these problems, beginning with simple seq2seq with attention models to going to Pointer-Generator, to using a curriculum learning approach called Scheduled-Sampling, till we reach the new approaches of combining reinforcement learning with seq2seq. We have applied these models on multiple datasets for multiple languages, English and Arabic. We have also introduced a new novel method of working with agglutinative languages, it is a preprocessing technique that is applied to the dataset which increases the relevancy of the vocabulary, which effectively increases the efficiency of the text summarization without modifying the models, we call this technique advanced cleaning, we have applied it to the Arabic dataset, and it can then be applied to any other agglutinative language. We have built these models in Jupiter notebooks to run seamlessly on Google colaboratory.11https://medium.com/@theamrzaki22https://github.com/theamrzaki/text_summurization_abstractive_methods
{"title":"Deep Architectures for Abstractive Text Summarization in Multiple Languages","authors":"Amr M. Zaki, M. Khalil, Hazem M. Abbas","doi":"10.1109/ICCES48960.2019.9068171","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068171","url":null,"abstract":"Abstractive text summarization is the task of generating a novel summary given an article, not by merely extracting and selecting text to produce a summary, but by actually creating and understating the given text to produce a summary. LSTM seq2seq encoder-decoder with attention models have proved successful in this task, but they suffer from some problems. In this work, we would go through multiple models to try and solve these problems, beginning with simple seq2seq with attention models to going to Pointer-Generator, to using a curriculum learning approach called Scheduled-Sampling, till we reach the new approaches of combining reinforcement learning with seq2seq. We have applied these models on multiple datasets for multiple languages, English and Arabic. We have also introduced a new novel method of working with agglutinative languages, it is a preprocessing technique that is applied to the dataset which increases the relevancy of the vocabulary, which effectively increases the efficiency of the text summarization without modifying the models, we call this technique advanced cleaning, we have applied it to the Arabic dataset, and it can then be applied to any other agglutinative language. We have built these models in Jupiter notebooks to run seamlessly on Google colaboratory.11https://medium.com/@theamrzaki22https://github.com/theamrzaki/text_summurization_abstractive_methods","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131546681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068159
Marianne A. Azer, A. Elshafee
This research focuses on using quantifiable methods for using the IoT as a main support to firefighting/intruder detection. From our research, we have found numerous researches associated to supplying remote services by means of portable sensors and communication technologies. We represent in our research a unique Smart Firefighting/lntruder Detection System with the support of Fuzzy Logic Decision Control (FIDFUZ). The projected system has an innovative value which is the Fuzzy Logic Decision Support System application that deals with the predicted inaccuracy and the doubt in the sensor's information acquired, as well as minimizing the rate of false positive and true negative. FIDFUZ full architecture is presented, applied and checked by simulation and using real data.
{"title":"Design and Implementation of Robust Firefighting/Intruder Detection System Using Fuzzy Logic Decision Control (FIDFUZ)","authors":"Marianne A. Azer, A. Elshafee","doi":"10.1109/ICCES48960.2019.9068159","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068159","url":null,"abstract":"This research focuses on using quantifiable methods for using the IoT as a main support to firefighting/intruder detection. From our research, we have found numerous researches associated to supplying remote services by means of portable sensors and communication technologies. We represent in our research a unique Smart Firefighting/lntruder Detection System with the support of Fuzzy Logic Decision Control (FIDFUZ). The projected system has an innovative value which is the Fuzzy Logic Decision Support System application that deals with the predicted inaccuracy and the doubt in the sensor's information acquired, as well as minimizing the rate of false positive and true negative. FIDFUZ full architecture is presented, applied and checked by simulation and using real data.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}