首页 > 最新文献

2018 International Conference on Advanced Science and Engineering (ICOASE)最新文献

英文 中文
ICOASE 2018 Cover Page ICOASE 2018封面
Pub Date : 2018-10-01 DOI: 10.1109/icoase.2018.8548897
{"title":"ICOASE 2018 Cover Page","authors":"","doi":"10.1109/icoase.2018.8548897","DOIUrl":"https://doi.org/10.1109/icoase.2018.8548897","url":null,"abstract":"","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast QR Decomposition Based on FPGA 基于FPGA的快速QR分解
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548895
S. Omran, Ahmed K. Abdul-abbas
The QR-decomposition (QRD) is an implementation necessary for many different detection algorithms such as MIMO (Multiple Input and Multiple Output) in wireless communication system. In this article, a QRD processor which decomposes the matrix into an orthogonal (Q matrix) and upper triangular matrix (R matrix) using Gram Schmidt algorithm is designed and implemented using a 32-bit High speed processor based on FPGA. This design requires 16 clock cycle to compute QR decomposition with 15.625 M QRDs per second throughput at 250 MHz operating frequency.
在无线通信系统中,多输入多输出(MIMO)等多种检测算法都需要qr分解(QRD)来实现。本文采用基于FPGA的32位高速处理器设计并实现了一种利用Gram Schmidt算法将矩阵分解为正交矩阵(Q矩阵)和上三角矩阵(R矩阵)的QRD处理器。本设计需要16个时钟周期来计算QR分解,在250 MHz工作频率下每秒吞吐量为15.625 M qrd。
{"title":"Fast QR Decomposition Based on FPGA","authors":"S. Omran, Ahmed K. Abdul-abbas","doi":"10.1109/ICOASE.2018.8548895","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548895","url":null,"abstract":"The QR-decomposition (QRD) is an implementation necessary for many different detection algorithms such as MIMO (Multiple Input and Multiple Output) in wireless communication system. In this article, a QRD processor which decomposes the matrix into an orthogonal (Q matrix) and upper triangular matrix (R matrix) using Gram Schmidt algorithm is designed and implemented using a 32-bit High speed processor based on FPGA. This design requires 16 clock cycle to compute QR decomposition with 15.625 M QRDs per second throughput at 250 MHz operating frequency.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigate the Carbon distribution and Structural Group Composition of Two Kurdistan Crude Oils (T-21A & PF2) and Their Fractions 研究了两种库尔德斯坦原油(T-21A和PF2)及其馏分的碳分布和结构族组成
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548925
S. Simo, Salah Aldin Naman, Kn Ahmed
For the first time, a determination of the total content of oil fractions in KRG was made using two samples of Kurdistan crude oils on the basis of the n-d-M method. To determine the structural-group composition of crude oil, it was proposed to use Tawke T-21A and Shekhan PF2 Crude oils. This paper is devoted to the study structural group of crude oil of different deposited differs from each other in physical and chemical properties. Since the properties of the oil determine the direction and application in petroleum refinery of its processing, to assess the quality of oil n-d-M method.
首次使用两种库尔德斯坦原油样品,基于n-d-M方法测定了KRG中石油馏分的总含量。为了确定原油的结构基团组成,建议使用陶克T-21A和Shekhan PF2原油。本文研究了不同沉积的原油在物理化学性质上的差异性。由于油品的性质决定了其加工的方向和在炼油厂的应用,因此采用n-d-M法评价油品质量。
{"title":"Investigate the Carbon distribution and Structural Group Composition of Two Kurdistan Crude Oils (T-21A & PF2) and Their Fractions","authors":"S. Simo, Salah Aldin Naman, Kn Ahmed","doi":"10.1109/ICOASE.2018.8548925","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548925","url":null,"abstract":"For the first time, a determination of the total content of oil fractions in KRG was made using two samples of Kurdistan crude oils on the basis of the n-d-M method. To determine the structural-group composition of crude oil, it was proposed to use Tawke T-21A and Shekhan PF2 Crude oils. This paper is devoted to the study structural group of crude oil of different deposited differs from each other in physical and chemical properties. Since the properties of the oil determine the direction and application in petroleum refinery of its processing, to assess the quality of oil n-d-M method.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimating and Mapping Aboveground Biomass of Natural Quercus Aegilops Using WorldView-3 Imagery 基于WorldView-3影像的天然栎地上生物量估算与制图
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548859
M. H. Obeyed, Yaseen T. Mustafa, Zeki M. Akrawee
Biomass estimation is a tool for assessing the amount of carbon stores in trees. An approach is presented to estimate aboveground biomass (AGB) of the scattered individual Quercus aegilops using very high resolution satellite imagery, WorldView-3 (WV3). First, an in-situ allometric model at tree level was developed, and AGB was estimated using the Diameter at Breast Height (DBH). Next, the allometric relationship between Tree Crown Area (TCA) derived from WV3 data and estimated in-situ AGB was investigated and used in the resulting model to estimate AGB (remote sensing derived). As a result, the developed allometric model in-situ produced a correlation of R2 = 0.99, and the developed allometric model remote sensing produced a correlation of R2 = 0.94. Tree AGB estimated from WV3 data was a good technique with a 1.24 bias and a root mean square error (RMSE) of 80.17. This approach can be used to accurately estimate and map AGB of scattered individual trees.
生物量估算是评估树木碳储量的一种工具。提出了一种利用超高分辨率卫星图像WorldView-3 (WV3)估算散居栎树单株地上生物量(AGB)的方法。首先,建立了树水平的原位异速生长模型,利用胸径(Diameter at Breast Height, DBH)估算AGB;接下来,研究了WV3数据得出的树冠面积(TCA)与估算的原位AGB之间的异速生长关系,并将其用于估算的AGB模型(遥感推导)。因此,原位开发的异速生长模型的相关系数为R2 = 0.99,而遥感开发的异速生长模型的相关系数为R2 = 0.94。从WV3数据估计的树AGB是一种很好的技术,偏差为1.24,均方根误差(RMSE)为80.17。该方法可用于准确估计和绘制分散的单株树的AGB。
{"title":"Estimating and Mapping Aboveground Biomass of Natural Quercus Aegilops Using WorldView-3 Imagery","authors":"M. H. Obeyed, Yaseen T. Mustafa, Zeki M. Akrawee","doi":"10.1109/ICOASE.2018.8548859","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548859","url":null,"abstract":"Biomass estimation is a tool for assessing the amount of carbon stores in trees. An approach is presented to estimate aboveground biomass (AGB) of the scattered individual Quercus aegilops using very high resolution satellite imagery, WorldView-3 (WV3). First, an in-situ allometric model at tree level was developed, and AGB was estimated using the Diameter at Breast Height (DBH). Next, the allometric relationship between Tree Crown Area (TCA) derived from WV3 data and estimated in-situ AGB was investigated and used in the resulting model to estimate AGB (remote sensing derived). As a result, the developed allometric model in-situ produced a correlation of R2 = 0.99, and the developed allometric model remote sensing produced a correlation of R2 = 0.94. Tree AGB estimated from WV3 data was a good technique with a 1.24 bias and a root mean square error (RMSE) of 80.17. This approach can be used to accurately estimate and map AGB of scattered individual trees.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations 基于DNA算术和生物运算的DNA多级加密技术
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548824
D. A. Zebari, H. Haron, Subhi R. M. Zeebaree, Diyar Qader Zeebaree
Networks have evolved very rapidly, which allow secret data transformation speedily through the Internet. However, the security of secret data has posed a serious threat due to openness of these networks. Thus, researchers draw their attention on cryptography field for this reason. Due to the traditional cryptographic techniques which are vulnerable to intruders nowadays. Deoxyribonucleic Acid (DNA) considered as a promising technology for cryptography field due to extraordinary data density and vast parallelism. With the help of the various DNA arithmetic and biological operations are also Blum Blum Shub (BBS) generator, a multi-level of DNA encryption algorithm is proposed here. The algorithm first uses the dynamic key generation to encrypt sensitive information as a first level; second, it uses BBS generator to generate a random DNA sequence; third, the BBS-DNA sequence spliced with a DNA Gen Bank reference to produce a new DNA reference. Then, substitution, permutation, and dynamic key are used to scramble the new DNA reference nucleotides locations. Finally, for further enhanced security, an injective mapping is established to combine encrypted information with encrypted DNA reference using Knight tour movement in Hadamard matrix. The National Institute of Standard and Technology (NIST) tests have been used to test the proposed algorithm. The results of the tests demonstrate that they effectively passed all the randomness tests of NIST which means they can effectively resist attack operations.
网络的发展非常迅速,这使得秘密数据可以通过Internet快速转换。然而,由于这些网络的开放性,机密数据的安全受到了严重的威胁。因此,研究人员开始关注密码学领域。由于传统的加密技术容易受到入侵者的攻击。脱氧核糖核酸(DNA)由于其惊人的数据密度和巨大的并行性而被认为是一种很有前途的密码技术。借助各种DNA算法和生物运算以及Blum Blum Shub (BBS)生成器,提出了一种多层次的DNA加密算法。该算法首先采用动态密钥生成作为一级加密敏感信息;其次,利用BBS生成器生成随机DNA序列;第三,将BBS-DNA序列与DNA genbank参考物拼接,生成新的DNA参考物。然后,采用置换、置换和动态密钥等方法来打乱新的DNA参考核苷酸的位置。最后,为了进一步提高安全性,利用Hadamard矩阵中的Knight tour运动,建立了一种将加密信息与加密DNA参考相结合的注入映射。美国国家标准与技术研究所(NIST)的测试已用于测试所提出的算法。测试结果表明,它们有效地通过了NIST的所有随机性测试,这意味着它们可以有效地抵御攻击操作。
{"title":"Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations","authors":"D. A. Zebari, H. Haron, Subhi R. M. Zeebaree, Diyar Qader Zeebaree","doi":"10.1109/ICOASE.2018.8548824","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548824","url":null,"abstract":"Networks have evolved very rapidly, which allow secret data transformation speedily through the Internet. However, the security of secret data has posed a serious threat due to openness of these networks. Thus, researchers draw their attention on cryptography field for this reason. Due to the traditional cryptographic techniques which are vulnerable to intruders nowadays. Deoxyribonucleic Acid (DNA) considered as a promising technology for cryptography field due to extraordinary data density and vast parallelism. With the help of the various DNA arithmetic and biological operations are also Blum Blum Shub (BBS) generator, a multi-level of DNA encryption algorithm is proposed here. The algorithm first uses the dynamic key generation to encrypt sensitive information as a first level; second, it uses BBS generator to generate a random DNA sequence; third, the BBS-DNA sequence spliced with a DNA Gen Bank reference to produce a new DNA reference. Then, substitution, permutation, and dynamic key are used to scramble the new DNA reference nucleotides locations. Finally, for further enhanced security, an injective mapping is established to combine encrypted information with encrypted DNA reference using Knight tour movement in Hadamard matrix. The National Institute of Standard and Technology (NIST) tests have been used to test the proposed algorithm. The results of the tests demonstrate that they effectively passed all the randomness tests of NIST which means they can effectively resist attack operations.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
An ICI Reduction Based on PAPR Clipping in Coherent Optical OFDM System 相干光OFDM系统中基于PAPR裁剪的ICI降低
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548855
L. A. AL-Hashemi, G. Al-Suhail, Sinan M. Abdul satar, A. N. Kareem, M. A. Hussein
The Inter-Carrier Interference (ICI) compensation for Coherent Optical Orthogonal Frequency Division Multiplexing (CO-OFDM) system has been studied in this paper. The purpose behind is to investigate the presence of ICI due to the impact of Laser Phase Noise (LPN) and Fiber Non-Linearity (FNL). Thereby, we propose a simple clipping scheme which represents an effective distortion algorithm to decrease the Peak to Average Power Ratio (PAPR) for 4QAM system. The method exhibits a significant process on ICI cancellation in CO-OFDM system. The OFDM signal is basically transmitted along 550km distance rated at 10Gbps single mode fiber for the coherent optical mode. The new findings show that the receiver sensitivity is highly improved below 10−3 FEC for laser power 5dBm; and archives about 1dBm to 2.4dBm when laser power becomes 8dBm at a typical clipping ratio of 0.6. In particular, the system exhibits a good performance over a 385km transmission distance in comparison to the conventional CO-OFDM. As a result, the proposed clipping shows that the system can enhance its the performance by reducing ICI in the CO-OFDM system; in addition to present a high robustness in BER metric against FNL by a clear reduction in PAPR.
研究了相干光正交频分复用(CO-OFDM)系统的载波间干扰(ICI)补偿问题。目的是研究激光相位噪声(LPN)和光纤非线性(FNL)的影响下光纤耦合耦合的存在。因此,我们提出了一种简单的裁剪方案,它代表了一种有效的失真算法,以降低4QAM系统的峰值与平均功率比(PAPR)。在CO-OFDM系统中,该方法对ICI消除效果显著。OFDM信号基本上以10Gbps的单模光纤传输550公里的距离,用于相干光模式。新的研究结果表明,当激光功率为5dBm时,接收器灵敏度在10−3 FEC以下得到了很大的提高;当激光功率为8dBm时,在典型的削波比为0.6时,约为1dBm至2.4dBm。特别是,与传统的CO-OFDM相比,该系统在385公里的传输距离上表现出良好的性能。实验结果表明,该方法可以通过降低CO-OFDM系统中的ICI来提高系统的性能;此外,通过明显降低PAPR,在BER指标中对FNL具有高稳健性。
{"title":"An ICI Reduction Based on PAPR Clipping in Coherent Optical OFDM System","authors":"L. A. AL-Hashemi, G. Al-Suhail, Sinan M. Abdul satar, A. N. Kareem, M. A. Hussein","doi":"10.1109/ICOASE.2018.8548855","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548855","url":null,"abstract":"The Inter-Carrier Interference (ICI) compensation for Coherent Optical Orthogonal Frequency Division Multiplexing (CO-OFDM) system has been studied in this paper. The purpose behind is to investigate the presence of ICI due to the impact of Laser Phase Noise (LPN) and Fiber Non-Linearity (FNL). Thereby, we propose a simple clipping scheme which represents an effective distortion algorithm to decrease the Peak to Average Power Ratio (PAPR) for 4QAM system. The method exhibits a significant process on ICI cancellation in CO-OFDM system. The OFDM signal is basically transmitted along 550km distance rated at 10Gbps single mode fiber for the coherent optical mode. The new findings show that the receiver sensitivity is highly improved below 10−3 FEC for laser power 5dBm; and archives about 1dBm to 2.4dBm when laser power becomes 8dBm at a typical clipping ratio of 0.6. In particular, the system exhibits a good performance over a 385km transmission distance in comparison to the conventional CO-OFDM. As a result, the proposed clipping shows that the system can enhance its the performance by reducing ICI in the CO-OFDM system; in addition to present a high robustness in BER metric against FNL by a clear reduction in PAPR.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artifact Paths Removal Algorithm for Ultra-wideband Channels 超宽带信道的伪迹路径去除算法
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548815
Y. Zahedi, R. Ngah
Channel impulse responses (CIRs) are extracted from measured waveforms based on a deconvolution process. In the case of Ultrawideband (UWB) communications, CIRs are extracted from measured UWB waveforms using some deconvolution algorithms, where CLEAN deconvolution algorithm is a well-known procedure for this aspect. However, the extraction of UWB CIRs is mostly prone to errors that are shown as artifact paths in the extracted CIRs. These artifact paths are represented as multipath components within the CIRs. In order to obtain more accurate CIRs, the artifact paths need to be eliminated. In this work, an algorithm is developed to remove the generated artifact paths available within UWB CIRs due to CLEAN utilization. The artifact paths removal (APR) algorithm has been developed based on the elliptical modeling concept applied for wideband channels. Results show that the APR algorithm has successfully removed the artifact paths from UWB CIRs. Moreover, a slight enhancement of the received power has been seen due to the removal of these weaker paths.
通道脉冲响应(CIRs)是基于反卷积过程从测量波形中提取出来的。在超宽带(UWB)通信的情况下,使用一些反褶积算法从测量的UWB波形中提取CIRs,其中CLEAN反褶积算法是这方面的一个众所周知的过程。然而,UWB CIRs的提取大多容易出现错误,这些错误在提取的CIRs中显示为工件路径。这些工件路径表示为cirr中的多路径组件。为了获得更精确的CIRs,需要消除工件路径。在这项工作中,开发了一种算法来删除由于使用CLEAN而在UWB CIRs中可用的生成的工件路径。基于椭圆建模的思想,提出了一种适用于宽带信道的伪迹路径去除算法。结果表明,APR算法成功地去除了超宽带CIRs中的伪路径。此外,由于去除这些较弱的路径,接收功率略有增强。
{"title":"Artifact Paths Removal Algorithm for Ultra-wideband Channels","authors":"Y. Zahedi, R. Ngah","doi":"10.1109/ICOASE.2018.8548815","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548815","url":null,"abstract":"Channel impulse responses (CIRs) are extracted from measured waveforms based on a deconvolution process. In the case of Ultrawideband (UWB) communications, CIRs are extracted from measured UWB waveforms using some deconvolution algorithms, where CLEAN deconvolution algorithm is a well-known procedure for this aspect. However, the extraction of UWB CIRs is mostly prone to errors that are shown as artifact paths in the extracted CIRs. These artifact paths are represented as multipath components within the CIRs. In order to obtain more accurate CIRs, the artifact paths need to be eliminated. In this work, an algorithm is developed to remove the generated artifact paths available within UWB CIRs due to CLEAN utilization. The artifact paths removal (APR) algorithm has been developed based on the elliptical modeling concept applied for wideband channels. Results show that the APR algorithm has successfully removed the artifact paths from UWB CIRs. Moreover, a slight enhancement of the received power has been seen due to the removal of these weaker paths.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified Table Lookup Substitution Method for Hiding Data in DNA 一种用于隐藏DNA数据的改进表查找替代方法
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548863
H. I. Hussein, W. M. Abduallah
Concealing confidential messages within DNA sequences has turned into a well-known research in latest years. This paper presents a modified scheme which is based on the Table Lookup Substitution Method (TLSM) to increase its security. The proposed scheme uses an 8-bit binary coding to transform a reference DNA sequence into a binary format to increase the security of the original TLSM. A comparison between the proposed modified scheme with the existing schemes besides the original TLSM is presented. The results and comparisons have proven the ability of the proposed scheme in balancing among the three critical properties for any DNA steganography scheme: capacity, payload, and BPN. In addition, the cracking probability of the proposed modified scheme is more complex than the original TLSM.
近年来,在DNA序列中隐藏机密信息已成为一项著名的研究。本文提出了一种基于表查找替换法(TLSM)的改进方案,以提高其安全性。该方案使用8位二进制编码将参考DNA序列转换为二进制格式,以提高原始TLSM的安全性。并将改进后的方案与现有的TLSM方案进行了比较。结果和比较证明了所提出的方案能够平衡任何DNA隐写方案的三个关键特性:容量、有效载荷和BPN。此外,改进方案的开裂概率比原TLSM更复杂。
{"title":"A Modified Table Lookup Substitution Method for Hiding Data in DNA","authors":"H. I. Hussein, W. M. Abduallah","doi":"10.1109/ICOASE.2018.8548863","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548863","url":null,"abstract":"Concealing confidential messages within DNA sequences has turned into a well-known research in latest years. This paper presents a modified scheme which is based on the Table Lookup Substitution Method (TLSM) to increase its security. The proposed scheme uses an 8-bit binary coding to transform a reference DNA sequence into a binary format to increase the security of the original TLSM. A comparison between the proposed modified scheme with the existing schemes besides the original TLSM is presented. The results and comparisons have proven the ability of the proposed scheme in balancing among the three critical properties for any DNA steganography scheme: capacity, payload, and BPN. In addition, the cracking probability of the proposed modified scheme is more complex than the original TLSM.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Evaluation of a Course Recommender System Using Content-Based Approach 基于内容的课程推荐系统设计与评价
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548789
A. A. Neamah, A. El-Ameer
Finding a user relevant information among huge number of data that are available in web is a difficult process. Therefore, an information filtering technique is needed to help the users to find their desired contents. Recommender system is the most famous technique which is used nowadays in many websites to support the suggestions making process. This paper will explain how to design a course recommender system by using kNN and Naïve Bayes classification algorithms, and evaluate their performances. The proposed recommender system follows content-based approach, by building a user profile (model), based on his/her prior knowledge and actions like, enrolling and rating courses, and compare it with courses attributes to generate recommended courses.
从海量的网络数据中找到与用户相关的信息是一个困难的过程。因此,需要一种信息过滤技术来帮助用户找到他们想要的内容。推荐系统是最著名的技术,目前许多网站都使用它来支持建议的制定过程。本文将介绍如何使用kNN和Naïve贝叶斯分类算法设计课程推荐系统,并对其性能进行评估。本文提出的推荐系统采用基于内容的方法,根据用户的先验知识和行为,如注册、评分等,建立用户档案(模型),并与课程属性进行比较,生成推荐课程。
{"title":"Design and Evaluation of a Course Recommender System Using Content-Based Approach","authors":"A. A. Neamah, A. El-Ameer","doi":"10.1109/ICOASE.2018.8548789","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548789","url":null,"abstract":"Finding a user relevant information among huge number of data that are available in web is a difficult process. Therefore, an information filtering technique is needed to help the users to find their desired contents. Recommender system is the most famous technique which is used nowadays in many websites to support the suggestions making process. This paper will explain how to design a course recommender system by using kNN and Naïve Bayes classification algorithms, and evaluate their performances. The proposed recommender system follows content-based approach, by building a user profile (model), based on his/her prior knowledge and actions like, enrolling and rating courses, and compare it with courses attributes to generate recommended courses.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Proposed Security Evaluation Method for Bluetooth E0 Based on Fuzzy Logic 一种基于模糊逻辑的蓝牙E0安全评价方法
Pub Date : 2018-10-01 DOI: 10.1109/ICOASE.2018.8548918
Sameer H. Alibadi, S. Sadkhan
The security level is very important in Bluetooth, because the network or devices using secure communication, are susceptible to many attacks against the transmitted data received through eavesdropping. The cryptosystem designers needs to know the complexity of the designed Bluetooth E0. And what the advantages given by any development performed on any known Bluetooth E0 Encryption method. The most important criteria can be used in evaluation method is considered as an important aspect. This paper introduce a proposed fuzzy logic technique to evaluate the complexity of Bluetooth E0 Encryption system by choosing two parameters, which are entropy and correlation rate, as inputs to proposed fuzzy logic based Evaluator, which can be applied with MATLAB system.
在蓝牙中,安全级别是非常重要的,因为使用安全通信的网络或设备,很容易受到许多攻击,通过窃听接收到的传输数据。密码系统设计者需要知道所设计的蓝牙E0的复杂性。以及在任何已知的蓝牙E0加密方法上进行的任何开发所带来的优势。最重要的是可以使用的标准是评价方法的一个重要方面。本文提出了一种模糊逻辑技术,通过选取熵和相关率两个参数作为模糊逻辑评估器的输入,对蓝牙E0加密系统的复杂度进行评估,并将其应用于MATLAB系统。
{"title":"A Proposed Security Evaluation Method for Bluetooth E0 Based on Fuzzy Logic","authors":"Sameer H. Alibadi, S. Sadkhan","doi":"10.1109/ICOASE.2018.8548918","DOIUrl":"https://doi.org/10.1109/ICOASE.2018.8548918","url":null,"abstract":"The security level is very important in Bluetooth, because the network or devices using secure communication, are susceptible to many attacks against the transmitted data received through eavesdropping. The cryptosystem designers needs to know the complexity of the designed Bluetooth E0. And what the advantages given by any development performed on any known Bluetooth E0 Encryption method. The most important criteria can be used in evaluation method is considered as an important aspect. This paper introduce a proposed fuzzy logic technique to evaluate the complexity of Bluetooth E0 Encryption system by choosing two parameters, which are entropy and correlation rate, as inputs to proposed fuzzy logic based Evaluator, which can be applied with MATLAB system.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2018 International Conference on Advanced Science and Engineering (ICOASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1